US5884270A - Method and system for facilitating an employment search incorporating user-controlled anonymous communications - Google Patents
Method and system for facilitating an employment search incorporating user-controlled anonymous communications Download PDFInfo
- Publication number
- US5884270A US5884270A US08/704,314 US70431496A US5884270A US 5884270 A US5884270 A US 5884270A US 70431496 A US70431496 A US 70431496A US 5884270 A US5884270 A US 5884270A
- Authority
- US
- United States
- Prior art keywords
- party
- data
- identity
- receiving
- requestor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/105—Human resources
- G06Q10/1053—Employment or hiring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the present invention relates to establishing anonymous communications between two or more parties. More specifically, the invention relates to controlling the release of confidential or sensitive information of at least one of the parties in establishing anonymous communications.
- shielded identity One form of anonymity involves "shielded identity,” where a trusted agent knows the identity of a masked party, but does not reveal that identity to others except under very special circumstances. Unless otherwise specified, the term “anonymity” is used throughout this application interchangeably with the notion of shielded identity.
- Shielded identity appears in a wide range of useful and commercial functions.
- a company might run an employment advertisement in a newspaper with a blind P.O. box known only to the publisher.
- a grand jury could hear testimony from a witness whose identity is known only to the prosecutor and the judge, but is concealed from the jurors, the accused, and opposing counsel.
- a person could identify a criminal suspect from a lineup of people who cannot see him.
- a recruiter could contact potential candidates for a job opening without revealing the client's name.
- Witness protection programs are designed to shield the true identity of witnesses enrolled in the programs.
- a sexual harassment hotline could be set up for victims of sexual harassment to call in with their complaints, while promising to protect the callers' identities.
- concealing identity can actually encourage or facilitate communication between unwilling or cautious parties. For example, a party negotiating a peace treaty with another may be unwilling to reveal his identity because, if the negotiations fail, that party might be exposed or subjected to potential blackmail.
- a hiring company In engaging such employment search firms, however, a hiring company entails some risk that the search firm will prematurely or indiscriminately reveal the company's identity to a potential candidate. Search firms are generally compensated based upon the number of successful placements, and thus are motivated to make vacant positions appear as attractive as possible to potential candidates. In doing so, search firms could be tempted to reveal enough information about the company for potential candidates to discover the identity of the company, or, for that matter, the firms may reveal the company's identity itself. Accordingly, hiring companies cannot be counted upon to maintain effective control of what information is released to potential candidates, and thus are unable to instill any satisfactory degree of confidence in their clients about the confidential status of their search for job replacements.
- search firms also creates inefficiencies.
- candidates looking for a new job may engage in a dialogue with the search firm, asking a series of detailed questions about the particular job, company expectations, various qualification criteria, benefits, options, perks, and other factors, all without the candidate knowing the name of the hiring company.
- the search firm may reveal, from general to specific, information about the hiring company. For instance, in response to questions, the search firm may successively reveal that the hiring company is a Fortune 500 company, a transportation company, an airline, headquartered in the Midwest, and, finally, that it is United Airlines.
- the candidate may also authorize the search firm to release information about itself
- the search firm may disclose that the candidate is employed at a small software company, that he is the head of a software development group of seven programmers, then that he is earning $75,000 plus a $20,000 bonus in his current job, then that he is located in the Stamford, Conn. area and then finally his identity.
- these actions may appear to be a type of "dance,” where each party seeks to learn the necessary information to keep the process moving forward.
- the search firm trusted by both parties, facilitates an assisted dialogue between the candidate and the company.
- search firms may target only certain individuals while overlooking many other qualified candidates who, if contacted, would have been very interested in considering the available positions. As such, search firms often do not reach a large pool of potential candidates. Search firms also know that the candidates most qualified for jobs are those that are currently employed. recruiters would love to be able to show these wished employees even better opportunities. Unfortunately, search firms have no way of identifying and contacting these prime candidates. Present systems for recruiting typically rely on the candidate to present himself to the recruiter--at a substantial risk to the employee. No system currently gives an employee the incentive and protection he needs to feel comfortable submitting his resume.
- Another area in which shield identity may be desirable is dating.
- a person could serve as a match-maker by setting up two people with whom he is acquainted on a blind date. Before agreeing to go on the date, each acquaintance may ask the match-maker questions about the other person and instruct the match-maker not to reveal his/her identity without prior authorization. Once each of the acquaintances feels comfortable about the other person, he/she may authorize the match-maker to reveal his/her identity and agree to the date.
- match-makers suffers from the same drawbacks as the search firms. There is little or no control over what information match-makers disclose. For instance, a match-maker may feel greater loyalty to one of the acquaintances and willingly divulge the identity of the other acquaintance. Also, using match-makers slows down the communication process and can result in miscommunication. Finally, the number of people that a match-maker can set up is limited by the number of people to whom the match-maker is acquainted.
- U.S. Pat. No. 5,164,897 discloses an automated method for selecting personnel matching certain job criteria. Databases storing employee qualifications are searched to identify which personnel have qualifications matching search criteria. Such a system, however, does not provide anonymous communications between the employer and the employee and does not provide control over the release of information stored within those systems to others. Thus, there is a need for a system that allows users to exercise control over the release of information to others and that provides efficient anonymous communication.
- the present invention is directed to a communications method and system that obviates problems due to limitations and disadvantages of the prior art.
- a goal of the invention is to provide a communication system incorporating a central database of information supplied by one or more of parties and managed by a central administrator, where all parties to the system can manage and control the release of any or all information about themselves or their identities, and where such a system allows for electronic-based communications between the parties without the necessity of revealing the identity of either party.
- Another goal of the invention to allow parties to submit criteria for searching a trusted agent's confidential database and receive a count of the number of records that satisfy the criteria, without revealing the identities of the parties associated with those records.
- a further goal of the invention is to allow a system administrator to send a request for authorization to release information about a party to a searching party.
- Another goals of the invention are to provide a system that encrypts communications between parties to maintain the anonymity of the parties; to authenticate searchable information contained in a central database for release to parties; to allow one or both parties to receive compensation for contributing or maintaining information accessible in a database; and to allow one party to apply a customized scoring algorithm to information contained about other parties in a database.
- Still other goals of this invention are to provide a system for a trusted agent to act as an anonymous remailer or communicate via e-mail or other electronic means with specific outside parties requested or identified by one of the parties to validate information about the parties.
- Yet another goal of the invention is to be able to store and authenticate such information that may be provided by outside parties in a central database while allowing the outside parties to retain control over the release of respective information to other parties.
- This invention meets these goals by allowing a party to maintain effective control over the timing and release of certain information stored in a database, including the party's identity and other relevant data about the party, to another party.
- This controlled release of identity can be performed gradually in a series of steps where the party authorizes release of more and more information.
- the invention also authenticates information stored in the database before releasing the information, thereby improving the reliability of the released information.
- the invention establishes a communications channel between a party and a requestor while not necessarily revealing the identity of the party and/or the requestor to each other.
- the controlled release of information in the invention allows for new improvements in the quality of the communication process when one party to the process would suffer significant costs or be exposed to significant risks if their identity were released prematurely or indiscriminately.
- a method and system for operating a computer system to facilitate an exchange of identities between two anonymous parties.
- the method and system are operative to receive from a first party first data including an identity of the first party and to receive from the first party at least two first-party rules for releasing the first data including a rule for releasing the identity of said first party.
- the system and method are further operative to receive from a second party a search request comprising at least one search criterion; receive from the second party second data including an identity of the second party; and receive from the second party at least two second-party rules for releasing the second party data including a rule for releasing the identity of the second party.
- the system and method are further operative to process said search request to determine if the first data satisfies the search criterion and if so, then exchanging the first and second data, except the identities of the first and second parties, between the first and second parties in accordance with the first-party and second-party rules.
- the system and method are further operative to transmit the identity of the first party to the second party after the exchanging step, upon satisfying the first-party rule for releasing the identity of the first party, and after the exchanging step, upon satisfying the second-party rule for releasing the identity of the second party, transmitting the identity of the second party to the first party.
- FIG. 1 illustrates one embodiment of the present invention
- FIG. 2A illustrates a block diagram of the central controller of the system in accordance with the embodiment in FIG. 1;
- FIG. 2B illustrates the contents of a party data database and a requestor data database in accordance with the embodiment in FIG. 1;
- FIG. 2C illustrates the contents of a verification database and an account database in accordance with the embodiment in FIG. 1;
- FIG. 3 illustrates a block diagram of a party terminal in accordance with the embodiment in FIG. 1;
- FIG. 4 illustrates a block diagram of a requestor terminal in accordance with the embodiment in FIG. 1;
- FIG. 5 illustrates a flow diagram of a preferred method for establishing anonymous communications in accordance with this invention
- FIGS. 6A-6B illustrate a flow diagram of a preferred method for searching for and releasing party data in accordance with this invention
- FIG. 7 illustrates a flow diagram of a preferred method for verifying the authenticity and accuracy of party data in accordance with this invention
- FIG. 8 illustrates a flow diagram of a preferred method for opening a communications channel between a party and a requestor in accordance with this invention.
- FIG. 9 illustrates a detailed flow diagram of a preferred method for transmitting party and requestor information in a communications channel in accordance with this invention.
- FIG. 1 illustrates one embodiment of an anonymous communication system 100 according to this invention.
- System 100 identifies parties having characteristics of interest to a requestor, releases certain information about the identified parties to the requestor with authorization from the parties, releases certain information about the requestor to the identified parties with authorization from the requestor, and provides a communications channel between the identified parties and the requestor while maintaining their anonymity.
- system 100 can be used to allow an employer (the requestor) to communicate with prospective candidates (the parties) whose background satisfies employment criteria provided by the employer without revealing the identity of the employer or the identities of the candidates.
- a software company may want to hire a programmer with 5+ years experience in writing C++, who is willing to live in Seattle, who will work 12-14 hour days 6 days a week, who will work for between $100,000 to $150,000 in salary plus bonuses, and who wants the opportunity to work for a startup with stock options in a publicly-traded company that could effectively double his salary.
- System 100 could identify a dozen candidates from resumes stored in a database, release information about these candidates only as authorized to the company, and deliver messages between the company and candidates without the company ever knowing the candidates identities.
- the invention can be used in connection with other applications, for the purpose of illustration, the employment search example is used throughout the specification.
- System 100 includes a public switched phone network 110, a central controller 200, party terminals 300, and requestor terminals 400.
- Central controller 200, party terminals 300, and requestor terminal 400 preferably connect to network 110 through respective two-way communication links.
- Parties e.g., candidates
- a requestor e.g., an employer
- the flow of data from terminals 300 and 400 is preferably limited and controlled by central controller 200.
- public switched telephone network 110 routes data to and from central controller 200, party terminals 300, and requestor terminal 400.
- network 110 comprises a commercially-implemented network of computer-controlled telephone switches operated by, for example, a telephone company.
- Network 110 may also include communication networks other than a public switched telephone network, such as a wireless network, a paging network, or the Internet.
- Central controller 200 controls the flow of data to and from party terminals 300 and requestor terminal 400.
- central controller 200 stores and authenticates the authorship of "party data” and "requestor data” received from party terminals 300 and requestor terminal 400, respectively.
- Party data comprises data about or corresponding to a respective party.
- Requestor data comprises data about or corresponding to the requestor.
- party data would include information that may be of interest to an employer about respective candidates, such as a candidate's identity, the candidate's address, the candidate's vital statistics, the candidate's work experience, the candidate's educational background, and the candidate's interests.
- each party fills out an electronic form that gets converted into an HTML format.
- the hyper-links can point to additional text, QuickTime video, JPG photos or audio clips, allowing for a rich presentation of information about the party.
- Requestor data would include information about the employer, such as the employer's identity, the number of its employees, the locations of its offices, the industry in which the employer operates, the positions available and their job descriptions, fiscal information about the employer, and the history of the employer. The requestor data is collected and stored using similar techniques to those outlined above for an employee's employment history.
- central controller 200 controls the release of requestor data and party data that the requestor and respective parties, respectively, have authorized for release.
- Central controller 200 also establishes a communications channel between party terminals 300 and requestor terminal 400, while maintaining the anonymity of the parties using party terminals 300 and the requestor using requestor terminal 400.
- the structure of controller 200 is described in greater detail below in connection with FIG. 2A.
- Party terminal 300 provides a party with an interface to system 100.
- party terminal 300 allows a party to enter party data and transmits it to central controller 200 via network 110.
- Party terminal 300 also allows a party to indicate which of the entered party data system 100 is authorized to release to a requestor, view requestor data, and communicate anonymously with the requestor at requestor terminal 400.
- the structure of party terminal 300 is described in greater detail in connection with FIG. 3.
- Requestor terminal 400 provides a requestor with an interface to system 100.
- requestor terminal 400 allows a requestor to enter requestor data and transmits the requestor data to central controller 200 via network 110.
- Requestor terminal 400 also allows a requestor to enter search criteria about parties of interest, to indicate which of the entered requestor data system 100 is authorized to release to a particular party, view party data, and communicate with parties at party terminals 300.
- the structure of requestor terminal 400 is described in greater detail in connection with FIG. 4.
- FIG. 2A illustrates a block diagram of central controller 200.
- central controller 200 includes CPU 205, cryptographic processor 210, RAM 215, ROM 220, network interface 245, and data storage device 250.
- Data storage device 250 includes a plurality of databases, including party data database 255, requestor data database 260, verification database 270, and account database 275, as well as program instructions (not shown) for CPU 205.
- CPU 205 is connected to each of the elements of central controller 200.
- the databases in data storage device 250 are preferably implemented as standard relational databases capable of supporting searching and storing multimedia information such as text, video, QuickTime movies, photographs, and audio.
- FIG. 2B illustrates exemplary record layouts for party data database 255 and requestor data database 260
- FIG. 2C illustrates record layouts for verification database 270 and account database 275.
- Each record layout preferably comprises a two-dimensional array of information with one column for "Field Name" and another column for "Field Characteristic.” The rows correspond to respective fields.
- the "authorization profile" field contained in each of the party data and requestor data databases preferably comprises a list of rules for releasing party or requestor data.
- the rules could simply include a list of companies to which party data is not to be released, or include characteristics of certain companies to which party data can be released, such as companies that are in the Fortune 500 and have stock option plans.
- Verification database 270 preferably includes cross-referencing fields (not shown) to party data database 255 and requestor data database 260. This allows indexing by verified information as well as other types of searches.
- CPU 205 executes program instructions stored in RAM 215, ROM 220, and data storage device 250 to perform various functions described in connection with FIGS. 5-9.
- CPU 205 is programmed to maintain data, including party data and requestor data, in storage device 250.
- CPU 205 receives party data and requestor data from network 110 through network interface 245 and stores the received party data and requestor data in databases 255 and 260, respectively.
- CPU 205 is also programmed to receive and store information in party database 255 and requestor database 260 indicating which of the party data and requestor data respective parties and requestors have authorized for release.
- CPU 205 Upon receipt of a request for authentication, CPU 205 transmits a verification request to a verification authority to authenticate the origin, authorship, and integrity of the party data and requestor data stored in databases 255 and 260, respectively, and maintains a record of the verification request in database 270.
- CPU 205 is also preferably programmed to search databases 255 and 260 and transmit information in response to the search.
- CPU 205 receives a search request containing certain criteria and searches the databases of storage device 250 to find matches. Based upon the search, CPU 205 releases certain information to the requestor and the parties.
- CPU 205 preferably assigns pseudonyms to each party and requestor, and stores the pseudonyms in databases 255 and 260, respectively.
- the pseudonyms can include coded identifiers, web page addresses, bulletin board addresses, pager numbers, telephone numbers, e-mail addresses, voice mail addresses, facsimile telephone numbers, and postal mail addresses.
- CPU 205 receives search criteria pertaining to parties of interest to the requestor and searches database 255 to identify parties whose party data satisfies the search criteria.
- search criteria There are a number of search techniques that can be used including keyword, fuzzy logic, and natural language search tools. For example, an employer could search for candidates with the following criteria: "two years of patent writing experience and lives in New England.”
- CPU 205 compares the criteria against each party registered with the system using one or more search algorithms and transmits to the requestor the number of parties identified. If CPU 205 receives a request for party data corresponding to the identified parties, CPU 205 transmits to requestor terminal 400 the party data that the identified parties previously authorized for release along with respective pseudonyms.
- CPU 205 can also transmit queries to party terminals 300 inquiring whether respective parties authorize the release of additional party data. If CPU 205 receives a request for requestor data from a party, CPU 205 transmits to the appropriate party terminal 300 the request data that the requestor previously authorized for release, along with a pseudonym corresponding to the requestor.
- CPU 205 is preferably also programmed to provide an anonymous communications channel between party terminals 300 and requestor terminal 400.
- CPU 205 receives a request for an anonymous communications channel along with a pseudonym of a party and a requestor.
- CPU 205 establishes either a real-time or non-real-time communications channel between the party and the requestor corresponding to the received pseudonyms.
- CPU 205 could transmit control signals to configure network 110 to provide a direct telephone connection between the party and the requestor at their respective terminals 300 and 400, thereby establishing a real-time communications channel.
- CPU 205 could receive and store electronic mail messages in electronic mailboxes assigned to the party and the requestor for their retrieval, thereby establishing a non-real-time communications channel.
- CPU 205 preferably comprises a conventional high-speed processor capable of executing program instructions to perform the functions described herein.
- central controller 200 is described as being implemented with a single CPU 205, in alternative embodiments, central controller 200 could be implemented with a plurality of processors operating in parallel or in series.
- RAM 215 and ROM 220 preferably comprise standard commercially-available integrated circuit chips.
- Data storage device 250 preferably comprises static memory capable of storing large volumes of data, such as one or more floppy disks, hard disks, CDS, or magnetic tapes.
- Network interface 245 connects CPU 205 to network 110.
- Interface 245 receives data streams from CPU 205 and network 110 formatted according to respective communication protocols.
- Interface 245 reformats the data streams appropriately and relays the data streams to network 110 and CPU 205, respectively.
- Interface 245 preferably accommodates several different communication protocols.
- Cryptographic processor 210 is programmed to encrypt, decrypt, and authenticate the stored data in each of the databases described above.
- Cryptographic processor 210 encrypts and decrypts data received by and transmitted from CPU 205. In a preferred embodiment, all party data and requestor data are encrypted before being transmitted onto network 110. Also, processor 210 encrypts the data before CPU 205 transmits such data via network 110. Any encrypted data received by CPU 205 is decrypted by processor 210.
- the cryptographic protocols used by cryptographic processor 210 are described below in the section entitled "Cryptographic Protocols.”
- FIG. 3 illustrates a block diagram of party terminal 300, according to one embodiment of the invention.
- Party terminal 300 includes CPU 305, which is connected to RAM 310, ROM 315, video driver 325, cryptographic processor 335, communication port 340, input device 345, and data storage device 360.
- Video monitor 330 is connected to video driver 325, and modem 350 is connected to communication port 340 and public switched phone network 110.
- CPU 305 executes program instructions stored in RAM 310, ROM 315, and information storage 370 to carry out various functions associated with party terminal 300.
- CPU 305 is programmed to receive data from input device 345, receive data from communication port 340, output queries and received data to video driver 325 for display on video monitor 330, and output data to communication port 340 for transmission by modem 350.
- CPU 305 preferably transmits the data to cryptographic processor 335 for encryption before outputting data to communication port 340 for transmission to network 110.
- CPU 305 receives encrypted data
- CPU 305 transmits the encrypted data to cryptographic processor 335 for decryption.
- CPU 305 preferably comprises a high-speed processor capable of performing the functions described herein.
- RAM 310 and ROM 315 comprise standard commercially-available integrated circuit chips.
- Information storage 370 comprises static memory capable of storing large volumes of data, such as one or more of floppy disks, hard disks, CDs, or magnetic tapes. Information storage 370 stores program instructions and received data.
- Video driver 325 relays received video and text data from CPU 305 to video monitor 330 for display.
- Video monitor 330 is preferably a high resolution video monitor capable of displaying both text and graphics.
- Cryptographic processor 335 encrypts and decrypts data in accordance with conventional encryption/decryption techniques and is preferably capable of decrypting code encrypted by cryptographic processor 210.
- Communication port 340 relays data between CPU 305 and modem 350 in accordance with conventional techniques.
- Modem 350 preferably comprises a high-speed data transmitter and receiver.
- Input device 345 comprises any data entry device for allowing a party to enter data, such as a keyboard, a mouse, a video camera, or a microphone. The operation of party terminal 300 is described in greater detail in connection with FIGS. 5-9.
- FIG. 4 illustrates a block diagram of requestor terminal 400 according to the invention.
- Terminal 400 in FIG. 4 includes CPU 405, which is connected to RAM 410, ROM 415, video driver 425, cryptographic processor 435, communication port 440, input device 445, and data storage device 460.
- Video monitor 430 is connected to video driver 425, and modem 450 is connected to communication port 440 and public switched telephone network 110.
- Terminals 300 and 400 are shown in FIGS. 3 and 4 to be structurally similar, though different reference numerals are used. As such, a more detailed description of terminal 400 can be obtained by referring to the above description of terminal 300. In a preferred embodiment, however, terminals 300 are used by parties, whereas terminal 400 is used by a requestor.
- system 100 encrypts data before transferring such data between system users (including both parties and requestors) and central controller 200, thereby providing various levels of security and privacy protection.
- users refers to both parties and requestors.
- a book entitled Applied Cryptography: Protocols, Algorithms, And Source Code In C by Bruce Schneier (2d Ed, John Wiley & Sons, Inc., 1996) describes in detail numerous cryptographic protocols that can be used.
- PKE A refers to the public encryption key of user A. This can be an RSA public key or a key for some other public key encryption scheme.
- SKE A refers to the secret decryption key corresponding to encryption key PKE A .
- PKS A refers to the public component of user A's signature key. This can be a DSS key or a key for some other public key signature scheme. It can also be the same key as PKE A in public key systems like RSA.
- SKS A refers to the private signature key corresponding to PKS A . It can also be the same key as SKE A in public key systems like RSA.
- E PKE (M) refers to the encryption of the plain text message M with the public encryption key PKE.
- E K (M) refers to the encryption of message M with a symmetric encryption algorithm and key K. It is apparent from the context whether the protocol uses public key or symmetric key encryption.
- D K (C) refers to the decryption of the cipher-text message C with a symmetric encryption algorithm and key K.
- S SKS (M) refers to signature of message M with secret signature key SKS.
- H(M) refers to the hash of the message M with a cryptographic hash function like MD5 or SHA.
- A,B refers to the concatenation of A and B. This is commonly used when describing messages.
- central controller 200 preferably uses the following protocol or the like to encrypt messages.
- Alice wants to encrypt a message M so that only Bob can read it.
- Alice obtains Bob's public encryption key, PKE B , generates a random symmetric encryption key K, and encrypts it with Bob's public key.
- Alice encrypts the message M with the key K using a symmetric encryption algorithm, like Triple-DES or IDEA, and sends
- K D SKE .spsb.B (E PKE .spsb.B (K))
- the bulk of the encryption is done using the symmetric encryption algorithm, which is orders of magnitude faster than the public key encryption algorithm.
- Typical signature schemes e.g. RSA or DSS
- RSA or DSS use a key pair for creating signatures and verifying them.
- One part of the pair, the private part, is used for generating signatures.
- the transformation for generating a signature is defined in such a way that only someone who knows the private part of the key pair can generate a signature. Hence, only the owner of the key pair can generate signatures.
- the other part of the pair is used to verify signatures.
- anyone including the owner of the key pair, can use the public component to verify that a signature is valid. However, it is computationally infeasible to use the public component to forge a signature.
- each user has a public key consisting of a modulus n and an exponent e, where n is a product of two secret primes p and q.
- Public key signature schemes are slow and a user can only sign messages that are smaller than n (when encoded in the ring Z/nZ).
- One solution is to hash the message M with a cryptographic hashing scheme (e.g. MD5 or SHA), and then sign the hash. The resulting hash is usually much smaller than the message and hence easier to sign.
- a cryptographic hashing scheme e.g. MD5 or SHA
- Each user communicating with central controller 200 should receive encrypted messages from central controller 200 and sign messages that they send to central controller 200.
- each user in the system requires a public/private encryption key pair and a public/private signature key pair. As noted above, these pairs could be the same pair in systems like RSA.
- Generating a key pair depends heavily upon the intended algorithm.
- a brief example for generating RSA encryption (and signature) keys is shown below.
- Central controller 200 determines the size for the public key. Typically, a 768-bit key is the recommended minimum, but 1024-bits provide a better minimum.
- Central controller 200 generates two primes p and q such that p>sqrt(pq)>q, and p and q are not close together (i.e. they are both roughly sqrt(n) in size, but different in size by two or three bits).
- Central controller 200 chooses a public exponent e. Common choices are 3, 17, and 65537 (2 16 +1).
- Central controller 200 computes the private exponent d by finding d such that
- Central controller 200 can do this using the extended Euclidean Algorithm.
- Central controller 200 publishes n and e as the public key.
- e is the public exponent which people use to encrypt messages to the public key user (a party, requestor or central controller 200) or to verify the signature (if the pair is the signature pair).
- the secret exponent, d is what is used to decrypt messages sent to the user or to generate signatures.
- the primes that central controller 200 chooses are preferably chosen at random. If an attacker can determined and q, then the attacker can also determine d. Several tests exist for determining whether a randomly chosen number m is prime or not. Typically one chooses a random number m and then uses primality tests to determine the first prime greater than or equal to m.
- each valid public key has a corresponding key certificate.
- the key certificate is signed by another user's private signature key higher up in the key hierarchy.
- the private signature key of the certificate authority whom everyone automatically trusts. In this case, the certificate authority would be central controller 200.
- a certificate The purpose of a certificate is to bind together in some authenticated way a public key, and a set of statements about this public key. The most important statement made is usually who owns the public key. Other potentially important statements might deal with what the key is and is not authorized to do, and when the key expires.
- central controller 200 has at least one signature key pair for which everyone using the system knows the public signature key. In one embodiment of the invention, central controller 200 will use two signature key pairs: one key pair for signing key certificates and one key pair for use in the rest of the protocols described. Central controller 200 keeps the certificate authority signature pair under lock and key except for when a key certificate needs to be signed. On the other hand, the other signature key pair is available at all times.
- central controller 200 Each time a new user (a party or requestor) registers with central controller 200, the certificate authority signature key is used by central controller 200 to sign a unique signature key pair for the user. This needs to be done before a user uses their signature key pair for the first time.
- central controller 200 generates a signature key pair and signed key certificate for the user. In an alternate embodiment, the user creates his own key pairs.
- Central controller 200 acting as the certificate authority, can also sign the key certificates for encryption keys. This has the advantage of reducing the number of signature verifications.
- the same method for generating signature key pairs is used for generating encryption key pairs.
- a user follows the following basic protocol when registering with central controller 200. Suppose that Alice is such a user:
- Alice generates a key certificate for her public signature key, sends a copy of the certificate and the public key to central controller 200, and asks central controller 200 to sign the certificate.
- Central controller 200 sends Alice a copy of the signed certificate.
- Alice generates a key certificate for her public encryption key and signs it with her private signature key.
- Alice After carrying out this protocol, Alice has a signed signature key and a signed encryption key. Furthermore, any user who wishes to send an encrypted message to Alice or verify her signature can obtain the public key component from central controller 200.
- central controller 200 stores signatures and the public components for all signature keys used in the system.
- each user has a copy of the public components of both of the central controller 200's signature keys.
- Most communication in system 100 occurs between parties and central controller 200 and between requestors and central controller 200. Where a requestor and a party communicate directly, each obtains copies of the other user's public signature and encryption keys from central controller 200.
- the interlock protocol "locks" the signatures generated by both users of a protocol to a particular instance of the protocol. This is accomplished by having each user sign a packet which the other user randomly generates. This causes the protocol to be non-deterministic and hence the signatures from one instance do not apply to another.
- the interlock protocol is described briefly below. Suppose that a party wishes to send a message C to central controller 200:
- the party generates a random number R 0 and sends
- M 0 R 0 , S SKS .sbsb.P (R 0 ) to Central controller 200.
- Central controller 200 verifies the party's signature. Central controller 200 then generates a random number R 1 and sends
- the party and central controller 200 both sign packets using values which cannot be known before the protocol starts.
- Central controller 200 cannot predict R 0 , so it cannot predict what M 0 will look like.
- the party cannot predict R 1 so he cannot predict what M 1 will look like.
- each of them must see the packets before they generate the signatures which means that anyone trying to impersonate the party must have the capability of generating signatures on his behalf This effectively thwarts a replay attack, which can be used to prevent an attacker from gaining, information as demonstrates next.
- an attacker Eve observes a party sending some encrypted packets to central controller 200. Although Eve does not know what the packets contain, she might be able to determine that they contain a resume. If a period of time passes in which the party and central controller 200 do not communicate and then central controller 200 sends the party an encrypted message, Eve's confidence that the party sent a resume should increase. Now, if Eve were to send the same encrypted message to central controller 200 that the party originally sent, eventually central controller 200 will send another encrypted message to the party.
- the attack that Eve (acting as a requestor) can mount is that she could submit one or more legitimate search requests to central controller 200 and wait for the results. By paying attention to how the size of the response to the request varies, Eve can deduce some information about the party's data. This sort of attack violates the party's privacy. By using the interlock protocol, Eve cannot replay the party's packets to central controller 200 because she won't be able to complete the interlock protocol.
- FIG. 5 illustrates a flow diagram of a method for providing anonymous communication in accordance with one embodiment of the invention.
- central controller 200 receives encrypted party data and encrypted requestor data (step 500).
- encrypted party data and requestor data preferably originates from party terminals 300 and requestor terminal 400, respectively.
- party terminals 300 prompt respective parties to enter party data by displaying requests for information on video monitor 330.
- video monitor 330 would request information that may be of interest to an employer, such as the candidate's identity, the candidate's address, the candidate's vital statistics, the candidate's work experience, the candidate's educational background, and the candidate's interests.
- the party would enter party data using input device 345.
- Cryptographic processor 335 would encrypt the entered party data and modem 350 would transmit the encrypted party data to central controller 200 via network 110.
- Requestor terminal 400 preferably operates in a similar manner to prompt a requestor for requestor data, receive and encrypt the requestor data, and transmit encrypted requestor data to central controller 200.
- Central controller 200 also assigns a pseudonym to each party and requestor whose party data and requestor data is stored in databases 255 and 260, respectively.
- cryptographic processor 210 of central controller 200 After receiving the encrypted party data and requestor data, cryptographic processor 210 of central controller 200 decrypts the received data (step 500).
- CPU 205 of central controller 200 stores the decrypted data in databases 255 and 260, respectively (step 500).
- Central controller 200 receives a search request to identify those parties whose party data satisfies certain criteria (step 510).
- the search request originates from requestor terminal 400, where a requestor entered the search request.
- cryptographic processor 435 of terminal 400 preferably encrypts the search request.
- Cryptographic processor 210 decrypts the encrypted search request upon receipt at central controller 200.
- Central controller 200 searches party data database 255 and, in response to the search, transmits certain information to requestor terminal 400 and party terminal 300 (step 510).
- FIGS. 6A and 6B illustrate a flow diagram showing step 510 in more detail.
- central controller 200 receives search criteria from requestor terminal 400 (step 600).
- This search criteria may include, for example, certain employment qualifications or educational background that an employer is interested in.
- central controller 200 searches database 255 for party data satisfying the search criteria (step 610). Controller 200 then transmits to requestor terminal 400 the results of the search, e.g., number of parties that it found to have party data satisfying the criteria (step 620). Alternatively, the number of parties would be transmitted to requestor terminal 400 along with pseudonyms for each of those parties.
- the requestor may refine or modify the search criteria. If the requestor chooses to modify the search criteria, the requestor enters the new search criteria into requestor terminal 400, which transmits the search criteria to central controller 200 (step 630), and steps 610 and 620 are repeated.
- central controller 200 determines whether the requestor requests party data about those parties found as a result of the search (step 640). Central controller 200 does not transmit any further data to the requestor at requestor terminal 400 and the transmission ends (step 645).
- step 640 If the requestor chooses to request party data (step 640), the requestor enters the party data request into requestor terminal 400, which transmits the request to central controller 200.
- Central controller 200 transmits an authorization request to party terminals 400 for authorization to release respective parties' party data (step 650).
- the party receiving the request for authorization can indicate whether to authorize central controller 200 to release some or all of its party data by entering one of three responses into party terminal 300 (step 660).
- the responses are sent to central controller 200. If central controller 200 receives a response that indicates that the party does not authorize release of any party data, central controller 200 does not provide any party data to requestor terminal 400, and the transaction ends (step 661). If, on the other hand, central controller 200 receives a response that indicates that the party authorizes release of some or all of its party data, central controller 200 transmits that party data to requestor terminal 400 for the requestor (step 662).
- Central controller 200 could also receive a response asking for data about the requestor before authorizing release of its party data (step 663). If so, central controller 200 transmits a query to the requestor at requestor terminal 400 asking for authorization to release requestor data to the party (step 670). If requestor does not authorize release of any requestor data to the party (step 680), central controller 200 does not release any requestor data to the party and the transaction ends (step 685). If the requestor does authorize release of some or all of the requestor data to the party (step 680), central controller 200 transmits the authorized requestor data to the party (step 690). Central controller 200 then awaits the party's response to see whether central controller 200 is authorized to release party data.
- permission certificates can be used in an alternate embodiment of the present invention.
- parties who use the system may not want anyone to know they are hunting for a job. Candidates may not want any of the people they work with to know.
- the party would like explicit control over who sees their resume. Therefore, whenever central controller 200 gets a request for a release of party data, central controller 200 needs to obtain explicit permission from the party to send the party's data to the requestor.
- a party decides to release his party data, he can be sure his data will be released only to the requestor making the request.
- a requestor "A” submits a request to release party data J and to central controller 200 in order to find out more about the party.
- the transaction ID, T helps ensure that each job description (and hence permission certificate) is unique.
- Central controller encrypts J' using the party's public encryption key and sends the encrypted message to the party.
- Central controller sends
- M 0 E PKE .sbsb.A (J',S SKS .sbsb.T (PKE A ,J'))
- the party's public key is included as part of the information that central controller 200 signs so a third party cannot forward a copy of a job description they received from central controller 200 to another party.
- the party decrypts the message to retrieve J', verifies central controller 200's signature, reads the request, and decides if he wants to release his party data. If he doesn't, then he stops the protocol here.
- the party generates a message M containing the following information:
- a pre-defined string which states that he gives his permission to release his party data to the requestor.
- a string which states the details about how he wants her party data released, whether or not he wishes to remain anonymous, etc.
- the party signs the message, encrypts it using central controller 200's public encryption key and sends it to central controller 200. Hence, she sends
- M 1 E PKE .sbsb.T (M,S SKS .sbsb.A (M))
- Central controller 200 decrypts the message to retrieve M, verifies the party's signature, and transmits the party's data to the requestor.
- central controller 200 cannot use the permission certificate for a different job description. This assumes, of course, that the request to release party data contains information unique to that request, such as a transaction ID number. Central controller 200 embeds the transaction ID in the request to release party data message.
- central controller 200 could assign a different transaction ID to each request and party. Hence, two different parties cannot easily check that they are getting the same request by comparing transaction IDs.
- central controller 200 needs to obtain permission from a requestor before releasing his requestor data to a party.
- central controller 200 can receive an authentication request to verify the authenticity of the origin, authorship, and/or integrity of party data or requestor data (step 520). Upon receiving this request, central controller 200 verifies the data and transmits a verification status to the party or requestor requesting data verification (step 520). Step 520 is described in greater detail in connection with FIG. 7. Central controller 200 receives a verification request from a requestor for verification of party data (step 700). As described above, this verification may include verifying the authenticity of any one of the origin, authorship, and integrity of the party data stored in databases 255.
- central controller 200 transmits a verification status request to a verification authority to verify the party data (step 710).
- the party data to be verified may include a university from which a candidate received an advanced degree.
- central controller 200 could transmit a verification status request to the candidate's purported educational institution to verify that the candidate did, in fact, receive an advanced degree from that institution.
- central controller 200 When central controller 200 receives a response to its request indicating the verification status of the party data, central controller 200 stores the verification status in verification database 270 (step 720), and transmits that verification status to the requestor at requestor terminal 400 (step 730).
- central controller 200 receives a request from a party to verify requestor data and transmits a request to a verification authority.
- central controller 200 receives the verification status from the verification authority, it transmits the verification status to the party.
- central controller 200 can establish an anonymous communications channel between a party and requestor (step 530). In this way, the party and the requestor can reveal or request information to and from each other. As described above, the communications channel can be real-time or non-real-time.
- FIG. 8 shows a flow diagram illustrating one embodiment of a method for opening a communications channel between party terminal 300 and requestor terminal 400 and
- FIG. 9 shows a flow diagram illustrating one embodiment of a method for managing the communication between party terminal 300 and requestor terminal 400.
- central controller 200 After receiving a communications channel request from a requestor to open a communications channel with a party (step 800), central controller 200 transmits a communication request to the party at party terminal 300 (step 810).
- the communication request asks the party whether it agrees to engage in a real-time or non-real-time communication with the requestor.
- central controller 200 If central controller 200 receives a response indicating that the party does not agree to engage in communication with the requestor (step 820), then central controller 200 does not open the communications channel and the transaction ends (step 830). If central controller 200 receives a response indicating that the party agrees to the request (step 820), central controller 200 opens a communications channel between party terminal 300 and requestor terminal 400 (step 840).
- the communications channel can be set up as either a real-time or non-real-time connection including an audio system (i.e., a telephone system), an electronic messaging system, and a video communication system.
- the communications channel includes a modification processor for modifying voice and/or video.
- central controller 200 After opening the communications channel, central controller 200 debits the requestor's billing account stored in database 275 and transmits a bill to the requestor (step 850). Central controller 200 could also collect payment from the requestor using other payment methods including: on-file credit card, periodic statement billing, account debit, and digital cash. Further, in one embodiment, central controller 200 transmits payments to parties for party activities including: allowing central controller 200 to maintain party data in party data database 255, communicating with requestors, and releasing party data.
- FIG. 9 illustrates a flow diagram of the method of step 530 for establishing a communications channel, in accordance with one embodiment of the invention.
- Central controller 200 receives a message from a requestor addressed to a particular party by pseudonym (step 900). Central controller 200 processes the message to remove any information that would reveal the identity of the requestor (step 910) in order to maintain the requestor's anonymity. Central controller 200 transmits the processed message to the party at party terminal 300 (step 920). Central controller 200 receives a response to the message from the party, removes any information that would reveal the identity of the party (step 940), and transmits the processed response to the requestor (step 950).
- Removing identity information may also include the use of voice and/or video modification processors in step 910 and 940. Steps 900-950 are repeated to allow multiple messages to pass between the party and the requestor, while maintaining the anonymity of the party and requestor.
- central controller 200 debits the requestor billing account according to the usage of the communications channel between the party and the requestor (step not shown).
- Central controller 200 can measure usage of the communications channel using one of several methods, including: number of messages exchanged, time that central controller 200 maintains the communications channel, the requestor's status (i.e., premium customers pay less), and geographic location of party terminal 300 and/or requestor terminal 400.
- Central controller 200 collects payment for certain transactions performed.
- central controller 200 transmits a bill to the requestor at requestor terminal 400 for each transaction and debits the requestors account (step 540), which is stored in database 275 of central controller 200.
- the payment scheme can be modified or varied to charge either the requestor or the party or both for various transactions executed by system 100, and particularly central controller 200.
- the payment scheme involves paying the party for submitting information to central controller 200, opening a communications channel, and/or releasing party data to a requestor.
- a party is payed each time he authorizes the release of his party data to a requestor.
- Central controller 200 will monitor the transactions to ensure that parties do not release information to the same requestor more than once in a given period of time.
- maintaining the anonymity of the party and requestor can be important to their communications. For example, an employer may not want its competitors to know that it is looking to expand its staff because it may give them an advantage. An attacker may attempt to examine the message traffic coming in and out of central controller 200 to expose the identity of a user of the system. A way to prevent this type of attack is to use an anonymous mix protocol during communication between a party or requestor and central controller 200.
- An anonymous mix uses a protocol to make it very difficult for anyone to trace the path of a message which passes through the mix.
- the anonymous mix takes outgoing messages from central controller 200 and randomly varies both the length of the message as well as the timing of its delivery.
- central controller 200 By adding a random time delay in the processing of incoming requests, central controller 200 also prevents an attacker from correlating (based on time) incoming requests with outgoing requests.
- An example of the anonymous protocol employed in the present invention is set forth below.
- PKE PKU (X) represents the public-key encryption of X under public key PK U .
- SIGN SKU (X) represents the digital signature of X under private key SK U .
- E K0 ⁇ (X) represents the symmetric encryption of X under key K 0 .
- PK U represents the public key of user U.
- SK U represents the private key of user U.
- D U represents the identification number of user U.
- g. X,Y represents the concatenation of X with Y.
- PK M is the anonymous mix public key.
- ID B is Bob's ID.
- PK B is Bob's public key.
- SK B is Bob's private key.
- K 0 a random session key
- P 0 an all-zero string of some random length.
- M 0 X 0 ,E K0 (ID B ,P 0 ,T).
- Alice then sends M 0 to the anonymous mix 180.
- Alice may also have encrypted and digitally signed the message she's sending to Bob. This has no bearing at all on how the anonymous mix processes it.
- P 0 disguises the size of the message, making it difficult, or virtually impossible, to correlate incoming messages with outgoing messages.
- the anonymous mix receives M 0 .
- anonymous mix decodes the random session key K 0 using anonymous mix private key SK M and then using K 0 , ID B , T and P O are decrypted.
- the anonymous mix looks up Bob's public key from ID B , and then forms:
- K 1 a random session key
- P 1 an all-zero string of some random length.
- X 1 PKE PKB (K 1 ).
- M 1 X 1 E K1 (P 1 ,T)
- Anonymous mix waits some random amount of time before sending M 1 to Bob. During this time, it is processing many other messages, both sending and receiving them.
- Anonymity may also serve to prevent a requestor and party from contacting each other outside the system in order to ensure that payment is received for bringing the two together.
- central controller 200 forces anonymity by blinding one or both parties. The requestor, for example, may not see the name of the party until the requestor's account has been debited.
- FIGS. 8 and 9 illustrate a method in which a communications channel between a party and requestor is established and managed by system 100 without either the party or the requestor learning the other's identity. While FIGS. 8 and 9 illustrate methods in which central controller 200 establishes the communications channel at a requestor's request, in alternative embodiments, a communications channel can be established at a party's request. In that case, central controller 200 receives a request for a communications channel from party terminal 300, transmits the request to requestor terminal 400, and establishes a communications channel in accordance with the requestor's response.
- system 100 can be used in connection with matchmaking (i.e., providing dating services). People, or "parties,” interested in dating can enter personal data, or "party data,” about themselves at party terminals 300. For each party, the party data may include the party's identity, the party's vital statistics, the party's background, and the party's interests.
- Central controller 200 and party terminals 300 receive and transmit the party data in the manner described above.
- requestors enter data, or "requestor data,” about themselves at request terminal 400, which encrypts and transmits the requestor data to central controller 200.
- requestors enter data, or "requestor data,” about themselves at request terminal 400, which encrypts and transmits the requestor data to central controller 200.
- each requestor enters, at request terminal 400, a search request specifying attributes about people that the requestor would like to date. For instance, the search request may specify that the requestor is interested in identifying men that are at least 6' tall and are college-educated.
- Request terminal 400 encrypts the search request and transmits the encrypted search request to central controller 200 for processing, as described above.
- central controller 200 In response to the search request, central controller 200 preferably transmits to requestor terminal 400 the number of people found to satisfy the criteria in the request, as described above in connection with FIG. 6A. In the example given above, central controller 200 would transmit to requestor terminal 400 the number of people who indicated that they are men, 6' tall, and college-educated, as revealed by party data database 255. Central controller 200 releases party data and requestor data to the requestor and parties, respectively, in the manner described above in connection with FIG. 6B. Central controller 200 can verify data, as described in connection with FIG. 7, and open a communications channel between a requestor and a party, as described in connection with FIGS. 8 and 9. When central controller 200 opens the communications channel, the requestor and the party can exchange adequate information about themselves to decide whether to agree to a date without subjecting themselves to any risk if either should decide not to agree to the date.
- the employment search and dating services examples demonstrate how the invention can: allow a requestor to search for parties meeting certain criteria, allow parties to control the release of information about themselves, and provide a communications channel between a requestor and the parties while maintaining the anonymity of the parties and the requestor from each other.
- the invention is not limited to those types of applications.
- Other applications include finding and interviewing consultants or freelancers for a specific project, auditioning actors and actresses, seeking a merger partner, and engaging in various commerce-based applications in which controlled anonymity by any party would be beneficial.
- the invention can be used in applications where the system establishes a communications channel between parties and authenticates information about the parties, while maintaining the anonymity of at least one of the parties.
- system 100 as described above, could be used for such applications.
- This embodiment allows two parties to communicate while each party is ensured that the information being communicated is valid.
- an employer can be certain that the information he receives is from an employee within his organization.
- the methods illustrated by the flow diagrams of FIGS. 5-9 could be readily adapted for these applications.
- system 100 could be used as a "whistle-blowing" system to allow employees of a company to anonymously report legal and policy violations without risking retribution by the company's management.
- the employee reporting a violation would preferably enter, into party terminal 300, data about the violation and data that can be independently verified as originating from the employee claiming the violation.
- the employee is referred to hereafter as the "party” and the data entered into party terminal 300 is referred to hereafter as the "party data.”
- the party data may include an employee identification number uniquely identifying each employee of the company.
- Party terminal 300 encrypts and transmits the party data to central controller 200, preferably in the manner described above.
- a company representative referred to as the "requestor," would use requestor terminal 400 to access the party data stored in central controller 200. After accessing the party data about the violation, the requestor could submit a request at requestor terminal 400 to have some or all of the party data authenticated. For example, central controller 200 could verify that the party is, in fact, an employee of the company by comparing an employee identification number contained in the party data with a list of active company employee identification numbers. If the number matches, central controller 200 would transmit a response to requestor terminal 400 confirming that the party is an active employee of the company.
- the requestor, or the party could enter a request into requestor terminal 400, or party terminal 300, for central controller 200 to open a communications channel with the party, or the requestor.
- Central controller 200 would open a communications channel, as described above in connection with FIGS. 8 and 9, to allow the party and the requestor to communicate, while maintaining the party's anonymity. This would allow the employer to question the employee about details relating to the incident in question, without the employee revealing his identity.
- system 100 could be used as a system to allow parties to remain anonymous while negotiating an agreement.
- criminals, or rule offenders anonymously offer to turn themselves in, while negotiating favorable treatment.
- the criminals, or rule offenders would represent the "parties” and law enforcement, or rule enforcers, would represent the "requestors.”
- a party would enter, at party terminal 300, information ("party data") about his violation and data that can be independently verified as originating from the party claiming the violation.
- the party data can include the party's identity, which is preferably only used by system 100 for verification purposes.
- Party terminal 300 would encrypt and transmit the party data to central controller 200, in the manner described above.
- a requestor would use requestor terminal 400 to access the party data stored in central controller 200.
- the requestor could enter a request for authentication of the party data into requestor terminal 300, which would transmit the request to central controller 200.
- Central controller 200 would verify some or all of the party data, as described above, and transmit a verification status message to requestor terminal 400.
- central controller can establish an anonymous communications channel with the other terminal, provided that the party and the requestor agree to engage in the communications channel. As described above, this communications channel can be real-time or non-real-time.
- the invention allows the requestor and the party to negotiate the terms of the party's sentence or punishment for committing the violation before the party reveals his identity. If negotiations fail, the party does not subject himself to any risk that the requestor will learn his identity simply because he initiated communication. The requestor, of course, can use whatever information the party revealed about himself during the course of the negotiation to learn the identity of the party.
- the invention also applies to other applications, such as authenticated phone-based tip lines and licensing negotiations where a licensee does not want to reveal the size of his company for fear of being charged more by the licensor.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Economics (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (33)
Priority Applications (13)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/704,314 US5884270A (en) | 1996-09-06 | 1996-09-06 | Method and system for facilitating an employment search incorporating user-controlled anonymous communications |
JP51277398A JP2002513522A (en) | 1996-09-06 | 1997-09-05 | Method and system for establishing and maintaining user-controlled anonymous communication |
EP97942385A EP0923825A4 (en) | 1996-09-06 | 1997-09-05 | Method and system for establishing and maintaining user-controlled anonymous communications |
AU44095/97A AU4409597A (en) | 1996-09-06 | 1997-09-05 | Method and system for establishing and maintaining user-controlled anonymous communications |
CA002264912A CA2264912C (en) | 1996-09-06 | 1997-09-05 | Method and system for establishing and maintaining user-controlled anonymous communications |
PCT/US1997/015320 WO1998010558A1 (en) | 1996-09-06 | 1997-09-05 | Method and system for establishing and maintaining user-controlled anonymous communications |
US09/752,706 US20010034708A1 (en) | 1996-09-06 | 2000-12-28 | Method and system for establishing and maintaining user-controlled anonymous communications |
US10/798,012 US20040199402A1 (en) | 1996-09-06 | 2004-03-11 | Method and system for anonymous communication of information about a home |
US11/427,369 US20060241963A1 (en) | 1996-09-06 | 2006-06-29 | Method and system for anonymous communication of information about a home |
US11/427,391 US20060241964A1 (en) | 1996-09-06 | 2006-06-29 | Method and system for anonymous communication of information about a home |
US11/427,388 US20060245553A1 (en) | 1996-09-06 | 2006-06-29 | Method and system for anonymous communication of information about a home |
US11/673,055 US20070129966A1 (en) | 1996-09-06 | 2007-02-09 | Method and system for anonymous communication of information |
US11/673,050 US20070129965A1 (en) | 1996-09-06 | 2007-02-09 | Method and system for anonymous communication of information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/704,314 US5884270A (en) | 1996-09-06 | 1996-09-06 | Method and system for facilitating an employment search incorporating user-controlled anonymous communications |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US26339299A Continuation | 1996-09-06 | 1999-03-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
US5884270A true US5884270A (en) | 1999-03-16 |
Family
ID=24828960
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/704,314 Expired - Lifetime US5884270A (en) | 1996-09-06 | 1996-09-06 | Method and system for facilitating an employment search incorporating user-controlled anonymous communications |
Country Status (1)
Country | Link |
---|---|
US (1) | US5884270A (en) |
Cited By (249)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6061789A (en) * | 1996-01-12 | 2000-05-09 | International Business Machines Corporation | Secure anonymous information exchange in a network |
US6126448A (en) * | 1998-07-06 | 2000-10-03 | Ho; Chi Fai | Computer-aided learning methods and apparatus for a job |
WO2000062181A1 (en) * | 1999-04-08 | 2000-10-19 | Keith Richard Holbrook | Information transmission and collection apparatus and method |
WO2000070470A1 (en) * | 1999-05-14 | 2000-11-23 | Careerworkstation, Inc. | Online method and computer system |
US6185573B1 (en) * | 1998-04-22 | 2001-02-06 | Millenium Integrated Systems, Inc. | Method and system for the integrated storage and dynamic selective retrieval of text, audio and video data |
WO2001013659A1 (en) * | 1999-08-12 | 2001-02-22 | Elad Barkan | Add-on base station for cellular network expansion |
US6209100B1 (en) * | 1998-03-27 | 2001-03-27 | International Business Machines Corp. | Moderated forums with anonymous but traceable contributions |
US6226359B1 (en) * | 1998-05-07 | 2001-05-01 | Bell Atlantic Network Services, Inc. | Voice mail source address indentification blocking |
WO2001033421A1 (en) * | 1999-11-02 | 2001-05-10 | Click2Hire, L.L.C. | System and method for matching a candidate with an employer |
WO2001039078A1 (en) * | 1999-11-24 | 2001-05-31 | Medical Jobspot.Com, Inc. | System and method for recruiting employees and finding employment for same |
WO2001043035A1 (en) * | 1999-12-13 | 2001-06-14 | Richardson Mary L | Method and system for employment placement |
WO2001043007A1 (en) * | 1997-06-19 | 2001-06-14 | Cbex, Inc. | Confidential market making system |
WO2001042935A1 (en) * | 1999-12-13 | 2001-06-14 | Weddingchannel.Com, Inc. | System and method for providing internet accessible registries |
WO2001061611A1 (en) * | 2000-02-16 | 2001-08-23 | Click2Hire, L.L.C. | System and method for matching a candidate with an employer |
US6285984B1 (en) * | 1996-11-08 | 2001-09-04 | Gregory J. Speicher | Internet-audiotext electronic advertising system with anonymous bi-directional messaging |
US20010032095A1 (en) * | 2000-01-14 | 2001-10-18 | Balbach Carl Teo | Context-specific contact information |
US20010034630A1 (en) * | 2000-04-21 | 2001-10-25 | Robert Half International, Inc. | Interactive employment system and method |
KR20010094123A (en) * | 2000-04-04 | 2001-10-31 | 김기영 | An expert job market agencing system and method using network |
KR20010096813A (en) * | 2000-04-14 | 2001-11-08 | 김호석 | Efficient link process of human resources on the web environment |
US20010049615A1 (en) * | 2000-03-27 | 2001-12-06 | Wong Christopher L. | Method and apparatus for dynamic business management |
WO2001097086A2 (en) * | 2000-06-15 | 2001-12-20 | Logistic Solutions, Inc. | Web-based data management system and method for employment data |
US6334133B1 (en) * | 1998-12-21 | 2001-12-25 | Frontline Data, Inc. | System and method for performing substitute fulfillment |
US20020007333A1 (en) * | 2000-02-02 | 2002-01-17 | Scolnik Pablo A. | Contract bidding for custom synthesis of a chemical structure |
US6341270B1 (en) | 1998-11-10 | 2002-01-22 | Aether Systems, Inc. | Method for providing vendor notification marketing in an electronic commerce network environment |
WO2002013040A1 (en) * | 2000-08-09 | 2002-02-14 | Keith Richard Holbrook | Information transmission and collection apparatus and method |
US20020023217A1 (en) * | 2000-08-04 | 2002-02-21 | Wheeler Lynn Henry | Manufacturing unique devices that generate digital signatures |
US20020029160A1 (en) * | 1998-12-21 | 2002-03-07 | Thompson Roland R. | Substitute fulfillment system |
US6363376B1 (en) | 1999-08-02 | 2002-03-26 | Individual Software, Inc. | Method and system for querying and posting to multiple career websites on the internet from a single interface |
US6370510B1 (en) * | 1997-05-08 | 2002-04-09 | Careerbuilder, Inc. | Employment recruiting system and method using a computer network for posting job openings and which provides for automatic periodic searching of the posted job openings |
US20020046075A1 (en) * | 2000-07-12 | 2002-04-18 | Dipayan Gangopadhyay | Certificate matching |
US6385620B1 (en) * | 1999-08-16 | 2002-05-07 | Psisearch,Llc | System and method for the management of candidate recruiting information |
US20020055867A1 (en) * | 2000-06-15 | 2002-05-09 | Putnam Laura T. | System and method of identifying options for employment transfers across different industries |
US20020059201A1 (en) * | 2000-05-09 | 2002-05-16 | Work James Duncan | Method and apparatus for internet-based human network brokering |
WO2002041114A2 (en) * | 2000-10-30 | 2002-05-23 | Raf Technology, Inc. | Verification engine for user authentication |
US20020062373A1 (en) * | 2000-09-20 | 2002-05-23 | Skingle Bruce James | System and method for portal infrastructure tracking |
US6398556B1 (en) | 1998-07-06 | 2002-06-04 | Chi Fai Ho | Inexpensive computer-aided learning methods and apparatus for learners |
US20020078150A1 (en) * | 2000-12-18 | 2002-06-20 | Nortel Networks Limited And Bell Canada | Method of team member profile selection within a virtual team environment |
US6411696B1 (en) * | 1996-12-31 | 2002-06-25 | Intel Corporation | System for finding a user with a preferred communication mechanism |
US20020082193A1 (en) * | 2000-09-20 | 2002-06-27 | Mitokor | Inhibition of mitochondrial calcium/sodium antiporter |
US20020103687A1 (en) * | 2001-02-01 | 2002-08-01 | Debbie Kipling | System and method for ordering contract workers |
US20020111843A1 (en) * | 2000-11-21 | 2002-08-15 | Wellenstein Carl J. | System and method for matching employment opportunities with job-seekers using the internet |
US20020116203A1 (en) * | 2001-02-20 | 2002-08-22 | Cherry Darrel D. | System and method for managing job resumes |
US20020143573A1 (en) * | 2001-04-03 | 2002-10-03 | Bryce John M. | Integrated automated recruiting management system |
US6466914B2 (en) * | 1998-03-11 | 2002-10-15 | Fujitsu Limited | Job brokering apparatus and recording medium |
US20020172350A1 (en) * | 2001-05-15 | 2002-11-21 | Edwards Brent W. | Method for generating a final signal from a near-end signal and a far-end signal |
US20020174008A1 (en) * | 2001-02-15 | 2002-11-21 | Hedson B.V. | Method and system for job mediation |
US20020187829A1 (en) * | 2001-06-07 | 2002-12-12 | Takashi Hasegawa | Cooperation service method of contents viewing/listening and an attraction, and contents receiver and attraction system which are used for this method |
US20020194162A1 (en) * | 2001-05-16 | 2002-12-19 | Vincent Rios | Method and system for expanding search criteria for retrieving information items |
US20030014519A1 (en) * | 2001-07-12 | 2003-01-16 | Bowers Theodore J. | System and method for providing discriminated content to network users |
US20030028650A1 (en) * | 2001-07-23 | 2003-02-06 | Yihsiu Chen | Flexible automated connection to virtual private networks |
US20030033185A1 (en) * | 2001-07-26 | 2003-02-13 | Leto Kevin R. | Method for matching a user to a subscriber |
US20030050811A1 (en) * | 2001-09-10 | 2003-03-13 | Freeman Robert B. | System and method for hiring an applicant |
US20030065540A1 (en) * | 1998-12-18 | 2003-04-03 | Spincor Llc | Providing termination benefits for employees |
US6546374B1 (en) | 1998-11-10 | 2003-04-08 | Aether Systems, Inc. | Apparatus for providing instant vendor notification in an electronic commerce network environment |
US20030083891A1 (en) * | 2001-10-25 | 2003-05-01 | Lang Kenny W. | Project Management tool |
US20030105642A1 (en) * | 2001-11-30 | 2003-06-05 | United Negro College Fund, Inc. | Selection of individuals from a pool of candidates in a competition system |
AU761448B2 (en) * | 2000-04-28 | 2003-06-05 | Buzzwig Inc. | Employment service |
US20030120531A1 (en) * | 1998-12-11 | 2003-06-26 | Lloyd Parker | Employee hiring by means of a single electronic docket communicated over a network |
US6587838B1 (en) | 1999-01-25 | 2003-07-01 | Aether Systems, Inc. | Method and system for conducting real time electronic commerce |
US20030144862A1 (en) * | 2001-04-24 | 2003-07-31 | Peggy Smith | Automated employment fulfillment system |
US6608888B2 (en) * | 1999-02-26 | 2003-08-19 | Bellsouth Intellectual Property Corporation | Methods and systems to provide a message in a messaging system without revealing an identity of the sending party |
US20030158949A1 (en) * | 2002-02-19 | 2003-08-21 | Miller Lawrence R. | System and method for single sign-on session management without central server |
US6618734B1 (en) | 2000-07-20 | 2003-09-09 | Spherion Assessment, Inc. | Pre-employment screening and assessment interview process |
US20030177277A1 (en) * | 2002-03-15 | 2003-09-18 | Ziv Dascalu | System and method for personal referrals |
US20030200321A1 (en) * | 2001-07-23 | 2003-10-23 | Yihsiu Chen | System for automated connection to virtual private networks related applications |
US20030208752A1 (en) * | 2002-05-03 | 2003-11-06 | Veleria Farris | Employee candidate computer and web-based interactive assessment software and method of employee candidate assessment |
US6654605B1 (en) | 1998-12-04 | 2003-11-25 | Lg Information & Communications, Ltd. | Point to multipoint radio data service |
US20030218633A1 (en) * | 2002-05-23 | 2003-11-27 | Grinshetyn Mikhail | Method and system for data capture with hidden applets |
US6662194B1 (en) * | 1999-07-31 | 2003-12-09 | Raymond Anthony Joao | Apparatus and method for providing recruitment information |
US20030229638A1 (en) * | 2001-02-05 | 2003-12-11 | Carpenter Edward L. | Method for providing access to online employment information |
US20030233459A1 (en) * | 2002-06-12 | 2003-12-18 | Lawrence Miller | Method and system for delayed cookie transmission in a client-server architecture |
US20030236862A1 (en) * | 2002-06-21 | 2003-12-25 | Lawrence Miller | Method and system for determining receipt of a delayed cookie in a client-server architecture |
US20040014457A1 (en) * | 2001-12-20 | 2004-01-22 | Stevens Lawrence A. | Systems and methods for storage of user information and for verifying user identity |
US6714944B1 (en) * | 1999-11-30 | 2004-03-30 | Verivita Llc | System and method for authenticating and registering personal background data |
US20040111300A1 (en) * | 2002-05-20 | 2004-06-10 | Callen Brock W. | Tax withholding on employee termination benefits |
US20040126748A1 (en) * | 1996-03-19 | 2004-07-01 | Ho Chi Fai | Computer-aided learning system and method |
US20040148220A1 (en) * | 2003-01-27 | 2004-07-29 | Freeman Robert B. | System and method for candidate management |
US6795555B1 (en) * | 1999-12-30 | 2004-09-21 | Nortel Networks Limited | Encryption key exchange protocol |
US20040199402A1 (en) * | 1996-09-06 | 2004-10-07 | Walker Jay S. | Method and system for anonymous communication of information about a home |
US20040210770A1 (en) * | 2003-04-17 | 2004-10-21 | Aleksey Sanin | Use of pseudonyms vs. real names |
US20040225550A1 (en) * | 2003-05-06 | 2004-11-11 | Interactive Clinical Systems, Inc. | Software program for, system for, and method of facilitating staffing of an opening in a work schedule at a facility |
US6826685B1 (en) * | 1998-06-10 | 2004-11-30 | International Business Machines Corporation | Method and system for the digital certificate generation and distribution |
US20040243428A1 (en) * | 2003-05-29 | 2004-12-02 | Black Steven C. | Automated compliance for human resource management |
US20040254809A1 (en) * | 2003-06-15 | 2004-12-16 | Mordechai Teicher | Apparatus and method for managing social games |
US20040260792A1 (en) * | 1996-11-08 | 2004-12-23 | Speicher Gregory J. | Integrated audiotext-internet personal ad services |
US20050021623A1 (en) * | 2003-05-07 | 2005-01-27 | Ahmed Syed Mike | Computer-implemented system for matching parties and subsequent automatic notification to matched parties |
US20050033633A1 (en) * | 2003-08-04 | 2005-02-10 | Lapasta Douglas G. | System and method for evaluating job candidates |
US20050083906A1 (en) * | 1996-11-08 | 2005-04-21 | Speicher Gregory J. | Internet-audiotext electronic advertising system with psychographic profiling and matching |
WO2005040998A1 (en) * | 2003-09-30 | 2005-05-06 | British Telecommunications Public Limited Company | Method and system for authenticating a user |
US6904407B2 (en) | 2000-10-19 | 2005-06-07 | William D. Ritzel | Repository for jobseekers' references on the internet |
US20050137896A1 (en) * | 2003-12-22 | 2005-06-23 | Pentecost Jared D. | Integrated recruiting system and method |
US6915269B1 (en) | 1999-12-23 | 2005-07-05 | Decisionsorter Llc | System and method for facilitating bilateral and multilateral decision-making |
US20050190934A1 (en) * | 2001-07-11 | 2005-09-01 | Speicher Gregory J. | Internet-audiotext electronic advertising system with respondent mailboxes |
US20050197919A1 (en) * | 1999-06-02 | 2005-09-08 | Robertson Steven C. | System and method for providing electronic multi-merchant gift certificate & contribution brokering services over a distributed network |
US20050226411A1 (en) * | 2002-06-19 | 2005-10-13 | Gemplus | Method of generating electronic keys for a public-key cryptography method and a secure portable object using said method |
US20050240457A1 (en) * | 2004-01-30 | 2005-10-27 | Connally Samuel B | Systems, methods and computer program products for facilitating evaluation of job applicants by search committees |
US6968313B1 (en) | 1999-11-15 | 2005-11-22 | H Three, Inc. | Method and apparatus for facilitating and tracking personal referrals |
US20050261950A1 (en) * | 2004-05-21 | 2005-11-24 | Mccandliss Glenn A | Method of scheduling appointment coverage for service professionals |
US20060036685A1 (en) * | 2004-07-30 | 2006-02-16 | Microsoft Corporation | Suggesting a discussion group based on indexing of the posts within that discussion group |
US7016863B1 (en) * | 1996-11-20 | 2006-03-21 | Fujitsu Limited | Marketing system and method processing market information of consumers and dealers via a network |
US7016853B1 (en) * | 2000-09-20 | 2006-03-21 | Openhike, Inc. | Method and system for resume storage and retrieval |
US20060080593A1 (en) * | 2004-10-08 | 2006-04-13 | Alexander Hudspith | System and method for generating computer-readable documents |
US20060085736A1 (en) * | 2004-10-16 | 2006-04-20 | Au Anthony S | A Scientific Formula and System which derives standardized data and faster search processes in a Personnel Recruiting System, that generates more accurate results |
US20060106774A1 (en) * | 2004-11-16 | 2006-05-18 | Cohen Peter D | Using qualifications of users to facilitate user performance of tasks |
US20060106667A1 (en) * | 2004-11-18 | 2006-05-18 | Coyne Christopher R | System and method for determining compatibility |
US20060106675A1 (en) * | 2004-11-16 | 2006-05-18 | Cohen Peter D | Providing an electronic marketplace to facilitate human performance of programmatically submitted tasks |
US20060116894A1 (en) * | 2004-11-29 | 2006-06-01 | Dimarco Anthony M | Talent management and career management system |
US20060129551A1 (en) * | 2003-06-15 | 2006-06-15 | Mordechai Teicher | Method and apparatus for leisure & entertainment merchandising |
US20060129835A1 (en) * | 1999-07-02 | 2006-06-15 | Kimberly Ellmore | System and method for single sign on process for websites with multiple applications and services |
US20060143214A1 (en) * | 2003-06-15 | 2006-06-29 | Mordechai Teicher | Method and apparatus for arranging social meetings |
US20060161952A1 (en) * | 1994-11-29 | 2006-07-20 | Frederick Herz | System and method for scheduling broadcast of an access to video programs and other data using customer profiles |
US7085806B1 (en) * | 2000-11-03 | 2006-08-01 | Matchnet Plc | Method and apparatus for recommending a match to another |
US20060173791A1 (en) * | 2001-09-21 | 2006-08-03 | First Usa Bank, N.A. | System for providing cardless payment |
US20060200423A1 (en) * | 1999-12-27 | 2006-09-07 | Pitchware, Inc. | System and Method to Facilitate and Support Exchange of Proprietary Information |
US20060206344A1 (en) * | 2005-03-12 | 2006-09-14 | Au Anthony S | Scientific Formula and System which derives and creates a standardized data table in a Personnel Recruiting System |
US20060206584A1 (en) * | 2005-03-11 | 2006-09-14 | Yahoo! Inc. | System and method for listing data acquisition |
US20060206517A1 (en) * | 2005-03-11 | 2006-09-14 | Yahoo! Inc. | System and method for listing administration |
US20060224729A1 (en) * | 2005-03-29 | 2006-10-05 | H Three, Inc. | Referral tracking |
US20060229995A1 (en) * | 2001-11-06 | 2006-10-12 | Ferraro Eugene F | Report form generator for anonymous reporting system |
US20060265266A1 (en) * | 2005-05-23 | 2006-11-23 | Changesheng Chen | Intelligent job matching system and method |
US20060265267A1 (en) * | 2005-05-23 | 2006-11-23 | Changsheng Chen | Intelligent job matching system and method |
US20060265269A1 (en) * | 2005-05-23 | 2006-11-23 | Adam Hyder | Intelligent job matching system and method including negative filtration |
US20060265268A1 (en) * | 2005-05-23 | 2006-11-23 | Adam Hyder | Intelligent job matching system and method including preference ranking |
US20060265270A1 (en) * | 2005-05-23 | 2006-11-23 | Adam Hyder | Intelligent job matching system and method |
US20070042333A1 (en) * | 1999-04-13 | 2007-02-22 | Ho Chi F | Inexpensive computer-aided learning methods and apparatus for learners |
US7188358B1 (en) * | 1998-03-26 | 2007-03-06 | Nippon Telegraph And Telephone Corporation | Email access control scheme for communication network using identification concealment mechanism |
US20070073803A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing a post-date component in a network environment |
US20070073548A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing a system that includes on-line and off-line features in a network environment |
US20070073549A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing testing and matching in a network environment |
US20070072468A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing an enhanced selection process in a network environment |
US20070073711A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing a pre-date component in a network environment |
US20070073687A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing enhanced questions for matching in a network environment |
US20070073802A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing on-line dating features in a network environment |
US7200578B2 (en) * | 1997-11-12 | 2007-04-03 | Citicorp Development Center, Inc. | Method and system for anonymizing purchase data |
US20070088562A1 (en) * | 2005-10-18 | 2007-04-19 | International Business Machines Corporation | Method and program product for identifying educational content for a business initiative |
US20070106547A1 (en) * | 2005-09-29 | 2007-05-10 | Bal Agrawal | System and method for a household services marketplace |
US20070118470A1 (en) * | 2001-11-01 | 2007-05-24 | Jpmorgan Chase Bank, N.A. | System and Method for Establishing or Modifying an Account With User Selectable Terms |
US20070116241A1 (en) * | 2005-11-10 | 2007-05-24 | Flocken Phil A | Support case management system |
US20070129966A1 (en) * | 1996-09-06 | 2007-06-07 | Walker Jay S | Method and system for anonymous communication of information |
US20070129517A1 (en) * | 2005-12-02 | 2007-06-07 | Lang Angela J | Method for preparing a flexible superabsorbent binder polymer composition |
US7233971B1 (en) | 2000-05-26 | 2007-06-19 | Levy & Associates, Inc. | System and method for analyzing work activity and valuing human capital |
US7249046B1 (en) * | 1998-10-09 | 2007-07-24 | Fuji Xerox Co., Ltd. | Optimum operator selection support system |
US20070185722A1 (en) * | 2006-01-04 | 2007-08-09 | Clarke Spencer R | Method for tracking employees |
US20070245245A1 (en) * | 2006-02-13 | 2007-10-18 | Allen Blue | Searching and reference checking within social networks |
US20070244740A1 (en) * | 1999-07-22 | 2007-10-18 | Desenberg Roger M | Systems, methods, and computer program products facilitating real-time transactions through the purchase of lead options |
US7290278B2 (en) | 2003-10-02 | 2007-10-30 | Aol Llc, A Delaware Limited Liability Company | Identity based service system |
WO2007127881A2 (en) * | 2006-04-26 | 2007-11-08 | Business Controls, Inc. | Anonymous reporting system |
US20070260605A1 (en) * | 2006-03-31 | 2007-11-08 | H Three, Inc. | Multiple-Listing Referral-Tracking System |
US20070292834A1 (en) * | 2006-05-30 | 2007-12-20 | Paul Ransdell | Method and system for establishing compatibility between potential students and universities |
US20080027747A1 (en) * | 2005-04-11 | 2008-01-31 | Mcgovern Robert | Method and apparatus for employment system distributed hiring and co-operative pooling |
WO2008045000A1 (en) * | 2006-10-09 | 2008-04-17 | Winmark Investments Pte. Ltd | A system and method for identifying and linking users having matching confidential information |
US20080091820A1 (en) * | 2006-10-12 | 2008-04-17 | Norman John G | Multiple-listing referral tracking system |
US20080127305A1 (en) * | 2002-05-29 | 2008-05-29 | Raf Technology, Inc. | Authentication query strategizer and results compiler |
US20080140656A1 (en) * | 2006-12-06 | 2008-06-12 | Jason Panda | System and Method for Matching Student Job Applicants to Part-Time Job Opportunities |
US20080172284A1 (en) * | 2007-01-17 | 2008-07-17 | Larry Hartmann | Management of job candidate interview process using online facility |
US20080183585A1 (en) * | 2002-03-19 | 2008-07-31 | Marc Vianello | Apparatus and methods for providing career employment services |
JP2008176650A (en) * | 2007-01-19 | 2008-07-31 | National Institute Of Advanced Industrial & Technology | Anonymous authentication system |
US20080208907A1 (en) * | 2007-02-23 | 2008-08-28 | Inqhire, A California Corporation | Employment recruiting |
US20080208873A1 (en) * | 2001-05-01 | 2008-08-28 | Boehmer Daniel R | Method for communicating confidential, educational information |
US20080222133A1 (en) * | 2007-03-08 | 2008-09-11 | Anthony Au | System that automatically identifies key words & key texts from a source document, such as a job description, and apply both (key words & text) as context in the automatic matching with another document, such as a resume, to produce a numerically scored result. |
US20080221910A1 (en) * | 2007-03-08 | 2008-09-11 | Anthony Au | Scientific Formula and System using a slider bar which derives standardized data and faster search processes in a Personnel Recruiting System that generates more accurate results |
US20080270579A1 (en) * | 1997-12-05 | 2008-10-30 | Pinpoint, Incorporated | Location enhanced information delivery system |
US7457764B1 (en) * | 2000-02-04 | 2008-11-25 | Iq Navigator | System and method for matching human resources to human resource needs |
US20080294584A1 (en) * | 1994-11-29 | 2008-11-27 | Pinpoint Incorporated | Customized electronic newspapers and advertisements |
US20090037235A1 (en) * | 2007-07-30 | 2009-02-05 | Anthony Au | System that automatically identifies a Candidate for hiring by using a composite score comprised of a Spec Score generated by a Candidates answers to questions and an Industry Score based on a database of key words & key texts compiled from source documents, such as job descriptions |
US7493279B1 (en) * | 2000-07-27 | 2009-02-17 | Khai Hee Kwan | Computer system and method for on-line display, negotiation and management of loan syndication over computer network |
US20090077063A1 (en) * | 2007-09-17 | 2009-03-19 | Inventec Corporation | Dynamic member match-making system and method thereof |
US20090083048A1 (en) * | 2007-09-21 | 2009-03-26 | Mandelbaum Steven J | System and method for providing an application service |
US20090112670A1 (en) * | 2003-05-29 | 2009-04-30 | Black Steven C | Human resources method for employee termination procedures |
US7552333B2 (en) | 2000-08-04 | 2009-06-23 | First Data Corporation | Trusted authentication digital signature (tads) system |
US20090164335A1 (en) * | 2000-02-04 | 2009-06-25 | Swapalease, Inc | Method, apparatus and program product for facilitating transfer of vehicle leases |
US20090177518A1 (en) * | 2008-01-04 | 2009-07-09 | Front Line Placement Technologies, Inc. | Method, system and program product for filling job orders |
US20090177527A1 (en) * | 2007-04-30 | 2009-07-09 | Flake Gary W | Rewarding influencers |
US20090177535A1 (en) * | 2007-09-18 | 2009-07-09 | Pmp Corporation | System and method for monitoring and executing substitute fulfillment |
US20090182602A1 (en) * | 2003-05-29 | 2009-07-16 | Hotlinkhr, Inc. | Human resources method for employee demographics reporting compliance |
US7565377B2 (en) | 2001-12-05 | 2009-07-21 | Robert Michael Watson | Artificially intelligent fulfillment system |
US20090198558A1 (en) * | 2008-02-04 | 2009-08-06 | Yahoo! Inc. | Method and system for recommending jobseekers to recruiters |
US20090235084A1 (en) * | 2001-11-06 | 2009-09-17 | Ferraro Eugene F | Anonymous reporting system |
US20090248493A1 (en) * | 2007-04-30 | 2009-10-01 | Flake Gary W | Systems for rewarding influences |
US20090254971A1 (en) * | 1999-10-27 | 2009-10-08 | Pinpoint, Incorporated | Secure data interchange |
US7613706B2 (en) | 2005-09-27 | 2009-11-03 | Match.Com L.L.C. | System and method for providing a search feature in a network environment |
US20090327042A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation arrangements having privacy preservation aspects |
US20090327066A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation arrangements providing for data tracking components |
US20090327041A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation arrangements between data providers and data consumers |
US20090327150A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation arrangements providing for data tracking components |
US20090327149A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation Arrangements for Data Brokering |
US20100017469A1 (en) * | 2005-06-17 | 2010-01-21 | Match.Com, L.L.C. | System and Method for Providing a Certified Photograph in a Network Environment |
US7676433B1 (en) | 2005-03-24 | 2010-03-09 | Raf Technology, Inc. | Secure, confidential authentication with private data |
US7685013B2 (en) | 1999-11-04 | 2010-03-23 | Jpmorgan Chase Bank | System and method for automatic financial project management |
US20100077032A1 (en) * | 2008-09-05 | 2010-03-25 | Match.Com, L.P. | System and method for providing enhanced matching based on question responses |
US20100082356A1 (en) * | 2008-09-30 | 2010-04-01 | Yahoo! Inc. | System and method for recommending personalized career paths |
US20100161450A1 (en) * | 1999-06-10 | 2010-06-24 | The Knot, Inc. | Method and system for universal gift registry |
US20100161503A1 (en) * | 2008-12-19 | 2010-06-24 | Foster Scott C | System and Method for Online Employment Recruiting and Evaluation |
US7756816B2 (en) | 2002-10-02 | 2010-07-13 | Jpmorgan Chase Bank, N.A. | System and method for network-based project management |
US20110066519A1 (en) * | 2008-08-21 | 2011-03-17 | Flake Gary W | Facilitating data brokering arrangements having auctioning aspects |
US7945468B1 (en) | 1999-08-20 | 2011-05-17 | Frontline Technologies, Inc. | Notification of employees via pass code accessed web pages |
US7970722B1 (en) | 1999-11-08 | 2011-06-28 | Aloft Media, Llc | System, method and computer program product for a collaborative decision platform |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US20110185053A1 (en) * | 1998-10-30 | 2011-07-28 | Victor Larson | Agile Network Protocol For Secure Communications Using Secure Domain Names |
US8005697B1 (en) | 2004-11-16 | 2011-08-23 | Amazon Technologies, Inc. | Performing automated price determination for tasks to be performed |
US8090725B1 (en) | 2006-01-13 | 2012-01-03 | CareerBuilder, LLC | Method and system for matching data sets of non-standard formats |
US8103679B1 (en) | 2006-01-13 | 2012-01-24 | CareerBuilder, LLC | Method and system for matching data sets of non-standard formats |
US8156051B1 (en) * | 2001-01-09 | 2012-04-10 | Northwest Software, Inc. | Employment recruiting system |
US8160960B1 (en) | 2001-06-07 | 2012-04-17 | Jpmorgan Chase Bank, N.A. | System and method for rapid updating of credit information |
US8185877B1 (en) | 2005-06-22 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for testing applications |
US8190893B2 (en) | 2003-10-27 | 2012-05-29 | Jp Morgan Chase Bank | Portable security transaction protocol |
US8219452B2 (en) | 2010-04-09 | 2012-07-10 | XO Group Inc. | Systems and methods for a centralized gift registry with upload and merge of a retailer-specific registry |
US8239531B1 (en) | 2001-07-23 | 2012-08-07 | At&T Intellectual Property Ii, L.P. | Method and apparatus for connection to virtual private networks for secure transactions |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
US8321682B1 (en) | 2008-01-24 | 2012-11-27 | Jpmorgan Chase Bank, N.A. | System and method for generating and managing administrator passwords |
US8335855B2 (en) | 2001-09-19 | 2012-12-18 | Jpmorgan Chase Bank, N.A. | System and method for portal infrastructure tracking |
US8375026B1 (en) | 2006-01-13 | 2013-02-12 | CareerBuilder, LLC | Method and system for matching data sets of non-standard formats |
US8438086B2 (en) | 2000-06-12 | 2013-05-07 | Jpmorgan Chase Bank, N.A. | System and method for providing customers with seamless entry to a remote server |
US8473735B1 (en) | 2007-05-17 | 2013-06-25 | Jpmorgan Chase | Systems and methods for managing digital certificates |
US8473490B2 (en) | 2005-09-27 | 2013-06-25 | Match.Com, L.L.C. | System and method for providing a near matches feature in a network environment |
US8517742B1 (en) * | 2005-05-17 | 2013-08-27 | American Express Travel Related Services Company, Inc. | Labor resource testing system and method |
US8543515B2 (en) | 2011-02-25 | 2013-09-24 | Career Management Solutions, Llc | System and method for social recruiting |
US8571975B1 (en) | 1999-11-24 | 2013-10-29 | Jpmorgan Chase Bank, N.A. | System and method for sending money via E-mail over the internet |
US8583563B1 (en) | 2008-12-23 | 2013-11-12 | Match.Com, L.L.C. | System and method for providing enhanced matching based on personality analysis |
US8583926B1 (en) | 2005-09-19 | 2013-11-12 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US8595080B2 (en) | 2010-04-09 | 2013-11-26 | XO Group Inc. | Systems and methods for a centralized gift registry with two-way synchronization |
US8793490B1 (en) | 2006-07-14 | 2014-07-29 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US20140289141A1 (en) * | 2013-03-22 | 2014-09-25 | George Kolber | Employment Job Centers with Equal Opportunity Tools |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US8874771B2 (en) | 1998-10-30 | 2014-10-28 | Virnetx, Inc. | Agile network protocol for secure communications with assured system availability |
US8914383B1 (en) * | 2004-04-06 | 2014-12-16 | Monster Worldwide, Inc. | System and method for providing job recommendations |
US8943201B2 (en) | 1998-10-30 | 2015-01-27 | Virnetx, Inc. | Method for establishing encrypted channel |
US20150081815A1 (en) * | 2013-09-17 | 2015-03-19 | Samsung Electronics Co., Ltd | Method of transmitting anonymous message and message transmission system using the same |
US20150111188A1 (en) * | 2013-10-23 | 2015-04-23 | Saji Maruthurkkara | Query Response System for Medical Device Recipients |
US20150186848A1 (en) * | 2013-12-31 | 2015-07-02 | Danny Wu | Third Party Interview Method |
US20150235180A1 (en) * | 2014-02-14 | 2015-08-20 | Recruiter Mls, Inc. | System and method for unifying an employment network of recruiters |
US20160148161A1 (en) * | 2009-11-20 | 2016-05-26 | David Ciccarelli | System for managing online transactions involving voice talent |
US9419957B1 (en) | 2013-03-15 | 2016-08-16 | Jpmorgan Chase Bank, N.A. | Confidence-based authentication |
US20160328680A1 (en) * | 2009-11-20 | 2016-11-10 | David Ciccarelli | Computer-implemented method of facilitating online interactions involving voice recordings using multiple electronic interfaces |
US9608826B2 (en) | 2009-06-29 | 2017-03-28 | Jpmorgan Chase Bank, N.A. | System and method for partner key management |
US9779390B1 (en) | 2008-04-21 | 2017-10-03 | Monster Worldwide, Inc. | Apparatuses, methods and systems for advancement path benchmarking |
US9860283B2 (en) | 1998-10-30 | 2018-01-02 | Virnetx, Inc. | Agile network protocol for secure video communications with assured system availability |
US9904793B2 (en) * | 2015-03-23 | 2018-02-27 | Intel Corporation | Systems, methods, and apparatus to provide private information retrieval |
US9985943B1 (en) | 2013-12-18 | 2018-05-29 | Amazon Technologies, Inc. | Automated agent detection using multiple factors |
US10148726B1 (en) | 2014-01-24 | 2018-12-04 | Jpmorgan Chase Bank, N.A. | Initiating operating system commands based on browser cookies |
US10181116B1 (en) | 2006-01-09 | 2019-01-15 | Monster Worldwide, Inc. | Apparatuses, systems and methods for data entry correlation |
US10185936B2 (en) | 2000-06-22 | 2019-01-22 | Jpmorgan Chase Bank, N.A. | Method and system for processing internet payments |
US10275780B1 (en) | 1999-11-24 | 2019-04-30 | Jpmorgan Chase Bank, N.A. | Method and apparatus for sending a rebate via electronic mail over the internet |
US10387839B2 (en) | 2006-03-31 | 2019-08-20 | Monster Worldwide, Inc. | Apparatuses, methods and systems for automated online data submission |
US10438225B1 (en) | 2013-12-18 | 2019-10-08 | Amazon Technologies, Inc. | Game-based automated agent detection |
US10511573B2 (en) | 1998-10-30 | 2019-12-17 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US20210035046A1 (en) * | 2019-07-30 | 2021-02-04 | OLX Global B.V. | Real-time recommendation systems and methods |
US11120404B2 (en) | 2019-08-07 | 2021-09-14 | Capital One Services, Llc | Method and system for dynamic data collection while optimize a smart device |
US11995613B2 (en) | 2014-05-13 | 2024-05-28 | Monster Worldwide, Inc. | Search extraction matching, draw attention-fit modality, application morphing, and informed apply apparatuses, methods and systems |
Citations (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4218738A (en) * | 1978-05-05 | 1980-08-19 | International Business Machines Corporation | Method for authenticating the identity of a user of an information system |
US4847890A (en) * | 1987-08-10 | 1989-07-11 | The Telephone Connection | Anonymous interactive telephone system |
US4870591A (en) * | 1987-08-24 | 1989-09-26 | International Business Machines Corp. | System for ensuring device compatibility |
US4914698A (en) * | 1988-03-16 | 1990-04-03 | David Chaum | One-show blind signature systems |
US4961224A (en) * | 1989-03-06 | 1990-10-02 | Darby Yung | Controlling access to network resources |
US4962532A (en) * | 1988-12-22 | 1990-10-09 | Ibm Corporation | Method for providing notification of classified electronic message delivery restriction |
US4962449A (en) * | 1988-04-11 | 1990-10-09 | Artie Schlesinger | Computer security system having remote location recognition and remote location lock-out |
US5018096A (en) * | 1987-12-28 | 1991-05-21 | Kabushiki Kaisha Toshiba | Security administrator for automatically updating security levels associated with operator personal identification data |
US5058152A (en) * | 1989-12-12 | 1991-10-15 | The Telephone Connection | Anonymous interactive telephone system having direct connect feature |
US5077665A (en) * | 1989-05-25 | 1991-12-31 | Reuters Limited | Distributed matching system |
US5107443A (en) * | 1988-09-07 | 1992-04-21 | Xerox Corporation | Private regions within a shared workspace |
US5164897A (en) * | 1989-06-21 | 1992-11-17 | Techpower, Inc. | Automated method for selecting personnel matched to job criteria |
US5267148A (en) * | 1989-02-27 | 1993-11-30 | Hitachi, Ltd. | Computer aided real-time decision support system and method |
JPH0619943A (en) * | 1992-06-29 | 1994-01-28 | Nippon Telegr & Teleph Corp <Ntt> | Electronic voting system |
US5283731A (en) * | 1992-01-19 | 1994-02-01 | Ec Corporation | Computer-based classified ad system and method |
JPH06224938A (en) * | 1993-01-27 | 1994-08-12 | Fujitsu Ltd | Electronic mail control method |
US5392353A (en) * | 1989-08-07 | 1995-02-21 | Tv Answer, Inc. | Interactive satellite broadcast network |
US5400393A (en) * | 1992-06-05 | 1995-03-21 | Phonemate, Inc. | Voice mail digital telephone answering device |
US5416694A (en) * | 1994-02-28 | 1995-05-16 | Hughes Training, Inc. | Computer-based data integration and management process for workforce planning and occupational readjustment |
US5459859A (en) * | 1991-06-18 | 1995-10-17 | Mitsubishi Denki Kabushiki Kaisha | Apparatus and system for providing information required for meeting with desired person while travelling |
US5485510A (en) * | 1992-09-29 | 1996-01-16 | At&T Corp. | Secure credit/debit card authorization |
US5495412A (en) * | 1994-07-15 | 1996-02-27 | Ican Systems, Inc. | Computer-based method and apparatus for interactive computer-assisted negotiations |
US5500513A (en) * | 1994-05-11 | 1996-03-19 | Visa International | Automated purchasing control system |
US5509064A (en) * | 1994-12-30 | 1996-04-16 | Ortho Pharmaceutical Corporation | Call routing and handling system for conveying confidential medical test result information to anonymous callers |
US5553145A (en) * | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
US5608446A (en) * | 1994-03-31 | 1997-03-04 | Lucent Technologies Inc. | Apparatus and method for combining high bandwidth and low bandwidth data transfer |
US5664115A (en) * | 1995-06-07 | 1997-09-02 | Fraser; Richard | Interactive computer system to match buyers and sellers of real estate, businesses and other property using the internet |
US5689799A (en) * | 1995-04-26 | 1997-11-18 | Wink Communications, Inc. | Method and apparatus for routing confidential information |
-
1996
- 1996-09-06 US US08/704,314 patent/US5884270A/en not_active Expired - Lifetime
Patent Citations (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4218738A (en) * | 1978-05-05 | 1980-08-19 | International Business Machines Corporation | Method for authenticating the identity of a user of an information system |
US4847890A (en) * | 1987-08-10 | 1989-07-11 | The Telephone Connection | Anonymous interactive telephone system |
US4870591A (en) * | 1987-08-24 | 1989-09-26 | International Business Machines Corp. | System for ensuring device compatibility |
US5018096A (en) * | 1987-12-28 | 1991-05-21 | Kabushiki Kaisha Toshiba | Security administrator for automatically updating security levels associated with operator personal identification data |
US4914698A (en) * | 1988-03-16 | 1990-04-03 | David Chaum | One-show blind signature systems |
US4962449A (en) * | 1988-04-11 | 1990-10-09 | Artie Schlesinger | Computer security system having remote location recognition and remote location lock-out |
US5107443A (en) * | 1988-09-07 | 1992-04-21 | Xerox Corporation | Private regions within a shared workspace |
US4962532A (en) * | 1988-12-22 | 1990-10-09 | Ibm Corporation | Method for providing notification of classified electronic message delivery restriction |
US5267148A (en) * | 1989-02-27 | 1993-11-30 | Hitachi, Ltd. | Computer aided real-time decision support system and method |
US4961224A (en) * | 1989-03-06 | 1990-10-02 | Darby Yung | Controlling access to network resources |
US5077665A (en) * | 1989-05-25 | 1991-12-31 | Reuters Limited | Distributed matching system |
US5164897A (en) * | 1989-06-21 | 1992-11-17 | Techpower, Inc. | Automated method for selecting personnel matched to job criteria |
US5392353A (en) * | 1989-08-07 | 1995-02-21 | Tv Answer, Inc. | Interactive satellite broadcast network |
US5058152A (en) * | 1989-12-12 | 1991-10-15 | The Telephone Connection | Anonymous interactive telephone system having direct connect feature |
US5361295A (en) * | 1989-12-12 | 1994-11-01 | The Telephone Connection | Anonymous interactive telephone system |
US5459859A (en) * | 1991-06-18 | 1995-10-17 | Mitsubishi Denki Kabushiki Kaisha | Apparatus and system for providing information required for meeting with desired person while travelling |
US5283731A (en) * | 1992-01-19 | 1994-02-01 | Ec Corporation | Computer-based classified ad system and method |
US5400393A (en) * | 1992-06-05 | 1995-03-21 | Phonemate, Inc. | Voice mail digital telephone answering device |
JPH0619943A (en) * | 1992-06-29 | 1994-01-28 | Nippon Telegr & Teleph Corp <Ntt> | Electronic voting system |
US5485510A (en) * | 1992-09-29 | 1996-01-16 | At&T Corp. | Secure credit/debit card authorization |
JPH06224938A (en) * | 1993-01-27 | 1994-08-12 | Fujitsu Ltd | Electronic mail control method |
US5416694A (en) * | 1994-02-28 | 1995-05-16 | Hughes Training, Inc. | Computer-based data integration and management process for workforce planning and occupational readjustment |
US5608446A (en) * | 1994-03-31 | 1997-03-04 | Lucent Technologies Inc. | Apparatus and method for combining high bandwidth and low bandwidth data transfer |
US5500513A (en) * | 1994-05-11 | 1996-03-19 | Visa International | Automated purchasing control system |
US5495412A (en) * | 1994-07-15 | 1996-02-27 | Ican Systems, Inc. | Computer-based method and apparatus for interactive computer-assisted negotiations |
US5509064A (en) * | 1994-12-30 | 1996-04-16 | Ortho Pharmaceutical Corporation | Call routing and handling system for conveying confidential medical test result information to anonymous callers |
US5553145A (en) * | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
US5689799A (en) * | 1995-04-26 | 1997-11-18 | Wink Communications, Inc. | Method and apparatus for routing confidential information |
US5664115A (en) * | 1995-06-07 | 1997-09-02 | Fraser; Richard | Interactive computer system to match buyers and sellers of real estate, businesses and other property using the internet |
Non-Patent Citations (24)
Title |
---|
"Restrac Expands Internet Recruiting . . . ", Business Wire (Jul. 10, 1996). |
"Romancing The Internet", Business Wire (Jul. 12, 1995). |
A. Michael Froomkin, "Flood Control On The Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases," Conference for the Second Century of the Univ. of Pittsburgh School of Law: The Adequacy of Current Legal Paradigms to Meet Future Challenges (Sep. 21, 1995). |
A. Michael Froomkin, Flood Control On The Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases, Conference for the Second Century of the Univ. of Pittsburgh School of Law: The Adequacy of Current Legal Paradigms to Meet Future Challenges (Sep. 21, 1995). * |
Aaron Weiss, "Grad Seeks Job", Internet World, pp. 76-79 (Sep. 1996). |
Aaron Weiss, Grad Seeks Job , Internet World , pp. 76 79 (Sep. 1996). * |
Debora Sparr et al., "The Net", Harvard Business Review, p. 125(May/Jun. 1996). |
Debora Sparr et al., The Net , Harvard Business Review , p. 125(May/Jun. 1996). * |
Gary H. Anthes, "Stealth E-mail Poses Corporate Security Rsik", Computerworld, p. 1 (Feb. 12, 1996). |
Gary H. Anthes, Stealth E mail Poses Corporate Security Rsik , Computerworld , p. 1 (Feb. 12, 1996). * |
Jeff Ubois, "Anonymity Has Its Place; Questions Concerning On-Line Anonymity Arise," Information Access Company, vol. 8, No. 8, p. 28(Apr. 28, 1995). |
Jeff Ubois, Anonymity Has Its Place; Questions Concerning On Line Anonymity Arise, Information Access Company , vol. 8, No. 8, p. 28(Apr. 28, 1995). * |
Jim Milloway, "Corporate Employment Bulletin Board ", WebStaff, Inc., 1996. |
Jim Milloway, Corporate Employment Bulletin Board , WebStaff, Inc. , 1996. * |
Lisa Sanders, "Smile, You're On Job-Candidate Camera", Business Week, p. 6 (Aug. 5, 1996). |
Lisa Sanders, Smile, You re On Job Candidate Camera , Business Week , p. 6 (Aug. 5, 1996). * |
Michelle Quinn, "Web Site For Fake E-Mail Backfires On Operator", The San Diego Union-Tribune, Ed. 1-8, p. 7 (Jun. 20, 1995). |
Michelle Quinn, Web Site For Fake E Mail Backfires On Operator , The San Diego Union Tribune , Ed. 1 8, p. 7 (Jun. 20, 1995). * |
Peter Lewis, "Cloaks and Daggers", Vantage Point, p. 133 (Jul. 1996). |
Peter Lewis, Cloaks and Daggers , Vantage Point , p. 133 (Jul. 1996). * |
Quay Partners Int l., Ltd., Net Gain For Recruiting , U.S. Banker (Jul. 1996). * |
Quay Partners Int'l., Ltd., "Net Gain For Recruiting", U.S. Banker (Jul. 1996). |
Restrac Expands Internet Recruiting . . . , Business Wire (Jul. 10, 1996). * |
Romancing The Internet , Business Wire (Jul. 12, 1995). * |
Cited By (466)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060161952A1 (en) * | 1994-11-29 | 2006-07-20 | Frederick Herz | System and method for scheduling broadcast of an access to video programs and other data using customer profiles |
US20090234878A1 (en) * | 1994-11-29 | 2009-09-17 | Pinpoint, Incorporated | System for customized electronic identification of desirable objects |
US7853600B2 (en) | 1994-11-29 | 2010-12-14 | Pinpoint, Incorporated | System and method for providing access to video programs and other data using customer profiles |
US8056100B2 (en) | 1994-11-29 | 2011-11-08 | Pinpoint, Incorporated | System and method for providing access to data using customer profiles |
US8171032B2 (en) | 1994-11-29 | 2012-05-01 | Pinpoint, Incorporated | Providing customized electronic information |
US20080294584A1 (en) * | 1994-11-29 | 2008-11-27 | Pinpoint Incorporated | Customized electronic newspapers and advertisements |
US6061789A (en) * | 1996-01-12 | 2000-05-09 | International Business Machines Corporation | Secure anonymous information exchange in a network |
US20040126748A1 (en) * | 1996-03-19 | 2004-07-01 | Ho Chi Fai | Computer-aided learning system and method |
US9141827B2 (en) | 1996-03-19 | 2015-09-22 | Iplearn, Llc | Computer-aided learning system and method |
US20070129966A1 (en) * | 1996-09-06 | 2007-06-07 | Walker Jay S | Method and system for anonymous communication of information |
US20060241964A1 (en) * | 1996-09-06 | 2006-10-26 | Walker Jay S | Method and system for anonymous communication of information about a home |
US20060241963A1 (en) * | 1996-09-06 | 2006-10-26 | Walker Jay S | Method and system for anonymous communication of information about a home |
US20040199402A1 (en) * | 1996-09-06 | 2004-10-07 | Walker Jay S. | Method and system for anonymous communication of information about a home |
US20040260792A1 (en) * | 1996-11-08 | 2004-12-23 | Speicher Gregory J. | Integrated audiotext-internet personal ad services |
US20050083906A1 (en) * | 1996-11-08 | 2005-04-21 | Speicher Gregory J. | Internet-audiotext electronic advertising system with psychographic profiling and matching |
US6285984B1 (en) * | 1996-11-08 | 2001-09-04 | Gregory J. Speicher | Internet-audiotext electronic advertising system with anonymous bi-directional messaging |
US20060031121A1 (en) * | 1996-11-08 | 2006-02-09 | Speicher Gregory J | System and method for introducing individuals over the internet to establish an acquaintance |
US7016863B1 (en) * | 1996-11-20 | 2006-03-21 | Fujitsu Limited | Marketing system and method processing market information of consumers and dealers via a network |
US6411696B1 (en) * | 1996-12-31 | 2002-06-25 | Intel Corporation | System for finding a user with a preferred communication mechanism |
US20020120532A1 (en) * | 1997-05-08 | 2002-08-29 | Mcgovern Robert J. | Computerized job search system |
US6370510B1 (en) * | 1997-05-08 | 2002-04-09 | Careerbuilder, Inc. | Employment recruiting system and method using a computer network for posting job openings and which provides for automatic periodic searching of the posted job openings |
WO2001043007A1 (en) * | 1997-06-19 | 2001-06-14 | Cbex, Inc. | Confidential market making system |
US7200578B2 (en) * | 1997-11-12 | 2007-04-03 | Citicorp Development Center, Inc. | Method and system for anonymizing purchase data |
US20080270579A1 (en) * | 1997-12-05 | 2008-10-30 | Pinpoint, Incorporated | Location enhanced information delivery system |
US6466914B2 (en) * | 1998-03-11 | 2002-10-15 | Fujitsu Limited | Job brokering apparatus and recording medium |
US7188358B1 (en) * | 1998-03-26 | 2007-03-06 | Nippon Telegraph And Telephone Corporation | Email access control scheme for communication network using identification concealment mechanism |
US6209100B1 (en) * | 1998-03-27 | 2001-03-27 | International Business Machines Corp. | Moderated forums with anonymous but traceable contributions |
US6185573B1 (en) * | 1998-04-22 | 2001-02-06 | Millenium Integrated Systems, Inc. | Method and system for the integrated storage and dynamic selective retrieval of text, audio and video data |
US6226359B1 (en) * | 1998-05-07 | 2001-05-01 | Bell Atlantic Network Services, Inc. | Voice mail source address indentification blocking |
US6826685B1 (en) * | 1998-06-10 | 2004-11-30 | International Business Machines Corporation | Method and system for the digital certificate generation and distribution |
US6398556B1 (en) | 1998-07-06 | 2002-06-04 | Chi Fai Ho | Inexpensive computer-aided learning methods and apparatus for learners |
US7201580B2 (en) | 1998-07-06 | 2007-04-10 | Chi Fai Ho | Inexpensive computer-aided learning methods and apparatus for learners |
US6213780B1 (en) | 1998-07-06 | 2001-04-10 | Chi Fai Ho | Computer-aided learning and counseling methods and apparatus for a job |
US20040142312A1 (en) * | 1998-07-06 | 2004-07-22 | Ho Chi Fai | Inexpensive computer-aided learning methods and apparatus for learners |
US6126448A (en) * | 1998-07-06 | 2000-10-03 | Ho; Chi Fai | Computer-aided learning methods and apparatus for a job |
US6685478B2 (en) | 1998-07-06 | 2004-02-03 | Chi Fai Ho | Inexpensive computer-aided learning methods and apparatus for learners |
US7249046B1 (en) * | 1998-10-09 | 2007-07-24 | Fuji Xerox Co., Ltd. | Optimum operator selection support system |
US9094399B2 (en) | 1998-10-30 | 2015-07-28 | Virnetx, Inc. | Method for establishing secure communication link between computers of virtual private network |
US8843643B2 (en) | 1998-10-30 | 2014-09-23 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US9038163B2 (en) | 1998-10-30 | 2015-05-19 | Virnetx, Inc. | Systems and methods for connecting network devices over communication network |
US8943201B2 (en) | 1998-10-30 | 2015-01-27 | Virnetx, Inc. | Method for establishing encrypted channel |
US9037713B2 (en) | 1998-10-30 | 2015-05-19 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9077694B2 (en) | 1998-10-30 | 2015-07-07 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9077695B2 (en) | 1998-10-30 | 2015-07-07 | Virnetx, Inc. | System and method for establishing an encrypted communication link based on IP address lookup requests |
US20110185053A1 (en) * | 1998-10-30 | 2011-07-28 | Victor Larson | Agile Network Protocol For Secure Communications Using Secure Domain Names |
US8904516B2 (en) | 1998-10-30 | 2014-12-02 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US8874771B2 (en) | 1998-10-30 | 2014-10-28 | Virnetx, Inc. | Agile network protocol for secure communications with assured system availability |
US9100375B2 (en) | 1998-10-30 | 2015-08-04 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US8868705B2 (en) | 1998-10-30 | 2014-10-21 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US8850009B2 (en) | 1998-10-30 | 2014-09-30 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US9819649B2 (en) | 1998-10-30 | 2017-11-14 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US9860283B2 (en) | 1998-10-30 | 2018-01-02 | Virnetx, Inc. | Agile network protocol for secure video communications with assured system availability |
US10511573B2 (en) | 1998-10-30 | 2019-12-17 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9027115B2 (en) | 1998-10-30 | 2015-05-05 | Virnetx, Inc. | System and method for using a registered name to connect network devices with a link that uses encryption |
US9374346B2 (en) | 1998-10-30 | 2016-06-21 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9386000B2 (en) | 1998-10-30 | 2016-07-05 | Virnetx, Inc. | System and method for establishing a communication link |
US9413766B2 (en) | 1998-10-30 | 2016-08-09 | Virnetx, Inc. | Method for establishing connection between devices |
US9479426B2 (en) | 1998-10-30 | 2016-10-25 | Virnetz, Inc. | Agile network protocol for secure communications with assured system availability |
US10187387B2 (en) | 1998-10-30 | 2019-01-22 | Virnetx, Inc. | Method for establishing connection between devices |
US9967240B2 (en) | 1998-10-30 | 2018-05-08 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US6341270B1 (en) | 1998-11-10 | 2002-01-22 | Aether Systems, Inc. | Method for providing vendor notification marketing in an electronic commerce network environment |
US6546374B1 (en) | 1998-11-10 | 2003-04-08 | Aether Systems, Inc. | Apparatus for providing instant vendor notification in an electronic commerce network environment |
US6654605B1 (en) | 1998-12-04 | 2003-11-25 | Lg Information & Communications, Ltd. | Point to multipoint radio data service |
US20030120531A1 (en) * | 1998-12-11 | 2003-06-26 | Lloyd Parker | Employee hiring by means of a single electronic docket communicated over a network |
US20030065540A1 (en) * | 1998-12-18 | 2003-04-03 | Spincor Llc | Providing termination benefits for employees |
US20050273371A1 (en) * | 1998-12-18 | 2005-12-08 | Callen Brock W | Providing termination benefits for employees |
US6944597B2 (en) | 1998-12-18 | 2005-09-13 | Spincor Llc | Providing termination benefits for employees |
US6675151B1 (en) | 1998-12-21 | 2004-01-06 | Frontline Data, Inc. | System and method for performing substitute fulfillment information compilation and notification |
US7430519B2 (en) | 1998-12-21 | 2008-09-30 | Frontline Placement Technologies, Inc. | Substitute fulfillment system |
US20090099899A1 (en) * | 1998-12-21 | 2009-04-16 | Frontline Placement Technologies, Inc. | System and method for performing substitute fulfillment |
US9760860B2 (en) | 1998-12-21 | 2017-09-12 | Frontline Technologies Group Llc | System and method for performing substitute fulfillment |
US20020029160A1 (en) * | 1998-12-21 | 2002-03-07 | Thompson Roland R. | Substitute fulfillment system |
US6334133B1 (en) * | 1998-12-21 | 2001-12-25 | Frontline Data, Inc. | System and method for performing substitute fulfillment |
US6587838B1 (en) | 1999-01-25 | 2003-07-01 | Aether Systems, Inc. | Method and system for conducting real time electronic commerce |
US6608888B2 (en) * | 1999-02-26 | 2003-08-19 | Bellsouth Intellectual Property Corporation | Methods and systems to provide a message in a messaging system without revealing an identity of the sending party |
WO2000062181A1 (en) * | 1999-04-08 | 2000-10-19 | Keith Richard Holbrook | Information transmission and collection apparatus and method |
US9792659B2 (en) | 1999-04-13 | 2017-10-17 | Iplearn, Llc | Computer-aided methods and apparatus to access materials in a network environment |
US20070042333A1 (en) * | 1999-04-13 | 2007-02-22 | Ho Chi F | Inexpensive computer-aided learning methods and apparatus for learners |
WO2000070470A1 (en) * | 1999-05-14 | 2000-11-23 | Careerworkstation, Inc. | Online method and computer system |
US20050197919A1 (en) * | 1999-06-02 | 2005-09-08 | Robertson Steven C. | System and method for providing electronic multi-merchant gift certificate & contribution brokering services over a distributed network |
US20100161449A1 (en) * | 1999-06-10 | 2010-06-24 | The Knot, Inc. | Method and system for universal gift registry |
US20100161450A1 (en) * | 1999-06-10 | 2010-06-24 | The Knot, Inc. | Method and system for universal gift registry |
US20110161195A1 (en) * | 1999-06-10 | 2011-06-30 | The Knot, Inc. | Method and system for universal gift registry |
US8032428B2 (en) | 1999-06-10 | 2011-10-04 | XO Group Inc. | Method and system for universal gift registry |
US8036953B2 (en) | 1999-06-10 | 2011-10-11 | XO Group Inc. | Method and system for universal gift registry |
US20060129835A1 (en) * | 1999-07-02 | 2006-06-15 | Kimberly Ellmore | System and method for single sign on process for websites with multiple applications and services |
US8590008B1 (en) | 1999-07-02 | 2013-11-19 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
US7966496B2 (en) | 1999-07-02 | 2011-06-21 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
US20070244740A1 (en) * | 1999-07-22 | 2007-10-18 | Desenberg Roger M | Systems, methods, and computer program products facilitating real-time transactions through the purchase of lead options |
US6662194B1 (en) * | 1999-07-31 | 2003-12-09 | Raymond Anthony Joao | Apparatus and method for providing recruitment information |
US20090083235A1 (en) * | 1999-07-31 | 2009-03-26 | Raymond Anthony Joao | Apparatus and method for providing job searching services, recruitment services and/or recruitment-related services |
US20150371192A1 (en) * | 1999-07-31 | 2015-12-24 | Raymond Anthony Joao | Apparatus and method for providing job searching services, recruitment services and/or recruitment-related services |
US20040107192A1 (en) * | 1999-07-31 | 2004-06-03 | Joao Raymond Anthony | Apparatus and method for providing job searching services recruitment services and/or recruitment-related services |
US9152943B2 (en) * | 1999-07-31 | 2015-10-06 | Gtj Ventures, Llc | Apparatus and method for providing job searching services, recruitment services and/or recruitment-related services |
US7490086B2 (en) | 1999-07-31 | 2009-02-10 | Raymond Anthony Joao | Apparatus and method for providing job searching services recruitment services and/or recruitment-related services |
US9760864B2 (en) * | 1999-07-31 | 2017-09-12 | Gtj Ventures, Llc | Apparatus and method for providing job searching services, recruitment services and/or recruitment-related services |
US6363376B1 (en) | 1999-08-02 | 2002-03-26 | Individual Software, Inc. | Method and system for querying and posting to multiple career websites on the internet from a single interface |
US6757674B2 (en) | 1999-08-02 | 2004-06-29 | Individual Software, Inc. | Method and system for querying and posting to multiple career websites on the internet from a single interface |
US10051133B2 (en) | 1999-08-12 | 2018-08-14 | Barkan Wireless Ip Holdings, L.P. | Systems, devices and methods for providing access to a distributed network |
WO2001013659A1 (en) * | 1999-08-12 | 2001-02-22 | Elad Barkan | Add-on base station for cellular network expansion |
US9392638B2 (en) | 1999-08-12 | 2016-07-12 | Barkan Wireless Ip Holdings, L.P. | Systems, devices and methods for providing access to a distributed network |
US20010039197A1 (en) * | 1999-08-12 | 2001-11-08 | Elad Barkan | Cellular network system and method |
US8014284B2 (en) | 1999-08-12 | 2011-09-06 | Elad Barkan | Cellular network system and method |
US8559312B2 (en) | 1999-08-12 | 2013-10-15 | Elad Barkan | Systems, devices and methods for providing access to a distributed network |
US6385620B1 (en) * | 1999-08-16 | 2002-05-07 | Psisearch,Llc | System and method for the management of candidate recruiting information |
US7945468B1 (en) | 1999-08-20 | 2011-05-17 | Frontline Technologies, Inc. | Notification of employees via pass code accessed web pages |
US8321254B2 (en) | 1999-08-20 | 2012-11-27 | Frontline Technologies, Inc. | Notification of employees via pass code accessed web pages |
US20090254971A1 (en) * | 1999-10-27 | 2009-10-08 | Pinpoint, Incorporated | Secure data interchange |
US7630986B1 (en) * | 1999-10-27 | 2009-12-08 | Pinpoint, Incorporated | Secure data interchange |
WO2001033421A1 (en) * | 1999-11-02 | 2001-05-10 | Click2Hire, L.L.C. | System and method for matching a candidate with an employer |
US7685013B2 (en) | 1999-11-04 | 2010-03-23 | Jpmorgan Chase Bank | System and method for automatic financial project management |
US8160988B1 (en) | 1999-11-08 | 2012-04-17 | Aloft Media, Llc | System, method and computer program product for a collaborative decision platform |
US7970722B1 (en) | 1999-11-08 | 2011-06-28 | Aloft Media, Llc | System, method and computer program product for a collaborative decision platform |
US8005777B1 (en) | 1999-11-08 | 2011-08-23 | Aloft Media, Llc | System, method and computer program product for a collaborative decision platform |
US6968313B1 (en) | 1999-11-15 | 2005-11-22 | H Three, Inc. | Method and apparatus for facilitating and tracking personal referrals |
US8571975B1 (en) | 1999-11-24 | 2013-10-29 | Jpmorgan Chase Bank, N.A. | System and method for sending money via E-mail over the internet |
US10275780B1 (en) | 1999-11-24 | 2019-04-30 | Jpmorgan Chase Bank, N.A. | Method and apparatus for sending a rebate via electronic mail over the internet |
WO2001039078A1 (en) * | 1999-11-24 | 2001-05-31 | Medical Jobspot.Com, Inc. | System and method for recruiting employees and finding employment for same |
US20140130184A1 (en) * | 1999-11-30 | 2014-05-08 | Verivita Llc | System and Method for Providing Access to Verified Personal Background Data |
US8627496B2 (en) * | 1999-11-30 | 2014-01-07 | Verivita Llc | Computer-readable medium for providing access to verified personal background data |
US20120096563A1 (en) * | 1999-11-30 | 2012-04-19 | Verivita Llc | System and Method for Providing Access to Verified Personal Background Data |
US6714944B1 (en) * | 1999-11-30 | 2004-03-30 | Verivita Llc | System and method for authenticating and registering personal background data |
US8037539B2 (en) * | 1999-11-30 | 2011-10-11 | Verivita Llc | System and method for providing access to verified personal background data |
US20040168080A1 (en) * | 1999-11-30 | 2004-08-26 | Shapiro Eileen C. | System and method for providing access to verified personal background data |
US20040093246A1 (en) * | 1999-12-13 | 2004-05-13 | Weddingchannel.Com | Systems and methods for providing Internet accessible registries |
US20080059332A1 (en) * | 1999-12-13 | 2008-03-06 | Holland Jeremy M | Systems and methods for reviewing gift information |
US20020072946A1 (en) * | 1999-12-13 | 2002-06-13 | Richardson Mary L. | Method and system for employment placement |
US20040158500A1 (en) * | 1999-12-13 | 2004-08-12 | Holland Jeremy Mark | Systems and methods for purchasing gifts |
US20080183676A1 (en) * | 1999-12-13 | 2008-07-31 | Jeremy Mark Holland | Systems and methods for reviewing gift information |
US6493742B1 (en) * | 1999-12-13 | 2002-12-10 | Weddingchannel.Com, Inc. | System and method for providing internet accessible registries |
US7505919B2 (en) * | 1999-12-13 | 2009-03-17 | Richardson Mary L | Method and system for employment placement |
WO2001043035A1 (en) * | 1999-12-13 | 2001-06-14 | Richardson Mary L | Method and system for employment placement |
WO2001042935A1 (en) * | 1999-12-13 | 2001-06-14 | Weddingchannel.Com, Inc. | System and method for providing internet accessible registries |
US6618753B2 (en) | 1999-12-13 | 2003-09-09 | Weddingchannel.Com, Inc. | Systems and methods for registering gift registries and for purchasing gifts |
US7184968B2 (en) | 1999-12-23 | 2007-02-27 | Decisionsorter Llc | System and method for facilitating bilateral and multilateral decision-making |
US20070162319A1 (en) * | 1999-12-23 | 2007-07-12 | Decisionsorter Llc | System and method for facilitating bilateral and multi |
US6915269B1 (en) | 1999-12-23 | 2005-07-05 | Decisionsorter Llc | System and method for facilitating bilateral and multilateral decision-making |
US7725347B2 (en) | 1999-12-23 | 2010-05-25 | Decisionsorter Llc | System and method for facilitating bilateral and multilateral decision-making |
US20060015456A1 (en) * | 1999-12-23 | 2006-01-19 | Shapiro Eileen C | System and method for facilitating bilateral and multilateral decision-making |
US20060200422A1 (en) * | 1999-12-27 | 2006-09-07 | Pitchware, Inc. | System and Method to Facilitate and Support Electronic Communication of Request for Proposals |
US8412637B2 (en) * | 1999-12-27 | 2013-04-02 | Michael D. Powell | System and method to facilitate and support electronic communication of request for proposals |
US7672904B2 (en) | 1999-12-27 | 2010-03-02 | Powell Michael D | System and method to facilitate and support electronic communication of ideas |
US20060200423A1 (en) * | 1999-12-27 | 2006-09-07 | Pitchware, Inc. | System and Method to Facilitate and Support Exchange of Proprietary Information |
US20060212406A1 (en) * | 1999-12-27 | 2006-09-21 | Pitchware, Inc. | System and Method to Facilitate and Support Electronic Communication of Ideas |
US20100250454A1 (en) * | 1999-12-27 | 2010-09-30 | Powell Michael D | Facilitating Electronic Exchange of Proprietary Information |
US7734552B2 (en) | 1999-12-27 | 2010-06-08 | Powell Michael D | Facilitating electronic exchange of proprietary information |
US8364599B2 (en) | 1999-12-27 | 2013-01-29 | Powell Michael D | System and method to facilitate and support electronic communication of ideas |
US20090292727A1 (en) * | 1999-12-27 | 2009-11-26 | Pitchware, Inc. | Facilitating Electronic Exchange of Proprietary Information |
US6795555B1 (en) * | 1999-12-30 | 2004-09-21 | Nortel Networks Limited | Encryption key exchange protocol |
US20010032095A1 (en) * | 2000-01-14 | 2001-10-18 | Balbach Carl Teo | Context-specific contact information |
US20020007333A1 (en) * | 2000-02-02 | 2002-01-17 | Scolnik Pablo A. | Contract bidding for custom synthesis of a chemical structure |
US7457764B1 (en) * | 2000-02-04 | 2008-11-25 | Iq Navigator | System and method for matching human resources to human resource needs |
US20090164335A1 (en) * | 2000-02-04 | 2009-06-25 | Swapalease, Inc | Method, apparatus and program product for facilitating transfer of vehicle leases |
US8015048B2 (en) | 2000-02-04 | 2011-09-06 | IQNavigator | System and method for matching human resources to human resource needs |
WO2001061611A1 (en) * | 2000-02-16 | 2001-08-23 | Click2Hire, L.L.C. | System and method for matching a candidate with an employer |
US20010049615A1 (en) * | 2000-03-27 | 2001-12-06 | Wong Christopher L. | Method and apparatus for dynamic business management |
KR20010094123A (en) * | 2000-04-04 | 2001-10-31 | 김기영 | An expert job market agencing system and method using network |
KR20010096813A (en) * | 2000-04-14 | 2001-11-08 | 김호석 | Efficient link process of human resources on the web environment |
US20010034630A1 (en) * | 2000-04-21 | 2001-10-25 | Robert Half International, Inc. | Interactive employment system and method |
AU761448B2 (en) * | 2000-04-28 | 2003-06-05 | Buzzwig Inc. | Employment service |
US20100198820A1 (en) * | 2000-05-09 | 2010-08-05 | James Duncan Work | Method and apparatus for internet-based human network brokering |
US8209374B2 (en) | 2000-05-09 | 2012-06-26 | James Duncan Work | Method and apparatus for internet-based human network brokering |
US20020059201A1 (en) * | 2000-05-09 | 2002-05-16 | Work James Duncan | Method and apparatus for internet-based human network brokering |
US8812604B2 (en) * | 2000-05-09 | 2014-08-19 | James Duncan Work | Method and apparatus for internet-based human network brokering |
US20130007050A1 (en) * | 2000-05-09 | 2013-01-03 | James Duncan Work | Method and apparatus for internet-based human network brokering |
US7725525B2 (en) * | 2000-05-09 | 2010-05-25 | James Duncan Work | Method and apparatus for internet-based human network brokering |
US20120233259A1 (en) * | 2000-05-09 | 2012-09-13 | James Duncan Work | Method and apparatus for internet-based human network brokering |
US7233971B1 (en) | 2000-05-26 | 2007-06-19 | Levy & Associates, Inc. | System and method for analyzing work activity and valuing human capital |
US8458070B2 (en) | 2000-06-12 | 2013-06-04 | Jpmorgan Chase Bank, N.A. | System and method for providing customers with seamless entry to a remote server |
US8438086B2 (en) | 2000-06-12 | 2013-05-07 | Jpmorgan Chase Bank, N.A. | System and method for providing customers with seamless entry to a remote server |
US8712816B2 (en) | 2000-06-15 | 2014-04-29 | Rightoptions Llc | Computerized apparatus for identifying industries for potential transfer of a job function |
WO2001097086A3 (en) * | 2000-06-15 | 2003-08-14 | Logistic Solutions Inc | Web-based data management system and method for employment data |
US8036924B2 (en) | 2000-06-15 | 2011-10-11 | Rightoptions Llc | System and method of identifying options for employment transfers across different industries |
WO2001097086A2 (en) * | 2000-06-15 | 2001-12-20 | Logistic Solutions, Inc. | Web-based data management system and method for employment data |
US20020055867A1 (en) * | 2000-06-15 | 2002-05-09 | Putnam Laura T. | System and method of identifying options for employment transfers across different industries |
US10185936B2 (en) | 2000-06-22 | 2019-01-22 | Jpmorgan Chase Bank, N.A. | Method and system for processing internet payments |
US20020046075A1 (en) * | 2000-07-12 | 2002-04-18 | Dipayan Gangopadhyay | Certificate matching |
US6618734B1 (en) | 2000-07-20 | 2003-09-09 | Spherion Assessment, Inc. | Pre-employment screening and assessment interview process |
US7493279B1 (en) * | 2000-07-27 | 2009-02-17 | Khai Hee Kwan | Computer system and method for on-line display, negotiation and management of loan syndication over computer network |
US7552333B2 (en) | 2000-08-04 | 2009-06-23 | First Data Corporation | Trusted authentication digital signature (tads) system |
US20090158029A1 (en) * | 2000-08-04 | 2009-06-18 | First Data Corporation | Manufacturing unique devices that generate digital signatures |
US7784106B2 (en) | 2000-08-04 | 2010-08-24 | First Data Corporation | Manufacturing unique devices that generate digital signatures |
US7500272B2 (en) | 2000-08-04 | 2009-03-03 | First Data Corporation | Manufacturing unique devices that generate digital signatures |
US20020023217A1 (en) * | 2000-08-04 | 2002-02-21 | Wheeler Lynn Henry | Manufacturing unique devices that generate digital signatures |
WO2002013040A1 (en) * | 2000-08-09 | 2002-02-14 | Keith Richard Holbrook | Information transmission and collection apparatus and method |
US20020082193A1 (en) * | 2000-09-20 | 2002-06-27 | Mitokor | Inhibition of mitochondrial calcium/sodium antiporter |
US7016853B1 (en) * | 2000-09-20 | 2006-03-21 | Openhike, Inc. | Method and system for resume storage and retrieval |
US20020062373A1 (en) * | 2000-09-20 | 2002-05-23 | Skingle Bruce James | System and method for portal infrastructure tracking |
US6904407B2 (en) | 2000-10-19 | 2005-06-07 | William D. Ritzel | Repository for jobseekers' references on the internet |
WO2002041114A2 (en) * | 2000-10-30 | 2002-05-23 | Raf Technology, Inc. | Verification engine for user authentication |
US8032927B2 (en) * | 2000-10-30 | 2011-10-04 | Raf Technology, Inc. | Verification engine for user authentication |
WO2002041114A3 (en) * | 2000-10-30 | 2002-09-12 | Raf Technology Inc | Verification engine for user authentication |
US8316418B2 (en) * | 2000-10-30 | 2012-11-20 | Raf Technology, Inc. | Verification engine for user authentication |
US20120005733A1 (en) * | 2000-10-30 | 2012-01-05 | Raf Technology, Inc. | Verification engine for user authentication |
US20100050233A1 (en) * | 2000-10-30 | 2010-02-25 | Raf Technology, Inc. | Verification engine for user authentication |
US20020091945A1 (en) * | 2000-10-30 | 2002-07-11 | Ross David Justin | Verification engine for user authentication |
US7085806B1 (en) * | 2000-11-03 | 2006-08-01 | Matchnet Plc | Method and apparatus for recommending a match to another |
US20020111843A1 (en) * | 2000-11-21 | 2002-08-15 | Wellenstein Carl J. | System and method for matching employment opportunities with job-seekers using the internet |
US20020078150A1 (en) * | 2000-12-18 | 2002-06-20 | Nortel Networks Limited And Bell Canada | Method of team member profile selection within a virtual team environment |
US8156051B1 (en) * | 2001-01-09 | 2012-04-10 | Northwest Software, Inc. | Employment recruiting system |
US20020103687A1 (en) * | 2001-02-01 | 2002-08-01 | Debbie Kipling | System and method for ordering contract workers |
US7099872B2 (en) | 2001-02-05 | 2006-08-29 | Employon Nj, Llc | Method for providing access to online employment information |
US20030229638A1 (en) * | 2001-02-05 | 2003-12-11 | Carpenter Edward L. | Method for providing access to online employment information |
US20020174008A1 (en) * | 2001-02-15 | 2002-11-21 | Hedson B.V. | Method and system for job mediation |
US20020116203A1 (en) * | 2001-02-20 | 2002-08-22 | Cherry Darrel D. | System and method for managing job resumes |
US20020143573A1 (en) * | 2001-04-03 | 2002-10-03 | Bryce John M. | Integrated automated recruiting management system |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US10380374B2 (en) | 2001-04-20 | 2019-08-13 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US20030144862A1 (en) * | 2001-04-24 | 2003-07-31 | Peggy Smith | Automated employment fulfillment system |
US20080208873A1 (en) * | 2001-05-01 | 2008-08-28 | Boehmer Daniel R | Method for communicating confidential, educational information |
WO2002093876A2 (en) * | 2001-05-15 | 2002-11-21 | Sound Id | Final signal from a near-end signal and a far-end signal |
US20020172350A1 (en) * | 2001-05-15 | 2002-11-21 | Edwards Brent W. | Method for generating a final signal from a near-end signal and a far-end signal |
WO2002093876A3 (en) * | 2001-05-15 | 2003-03-13 | Sound Id | Final signal from a near-end signal and a far-end signal |
US20020194162A1 (en) * | 2001-05-16 | 2002-12-19 | Vincent Rios | Method and system for expanding search criteria for retrieving information items |
US20020187829A1 (en) * | 2001-06-07 | 2002-12-12 | Takashi Hasegawa | Cooperation service method of contents viewing/listening and an attraction, and contents receiver and attraction system which are used for this method |
US8160960B1 (en) | 2001-06-07 | 2012-04-17 | Jpmorgan Chase Bank, N.A. | System and method for rapid updating of credit information |
US20050190934A1 (en) * | 2001-07-11 | 2005-09-01 | Speicher Gregory J. | Internet-audiotext electronic advertising system with respondent mailboxes |
US8185940B2 (en) | 2001-07-12 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for providing discriminated content to network users |
US20030014519A1 (en) * | 2001-07-12 | 2003-01-16 | Bowers Theodore J. | System and method for providing discriminated content to network users |
US8239531B1 (en) | 2001-07-23 | 2012-08-07 | At&T Intellectual Property Ii, L.P. | Method and apparatus for connection to virtual private networks for secure transactions |
US7827278B2 (en) | 2001-07-23 | 2010-11-02 | At&T Intellectual Property Ii, L.P. | System for automated connection to virtual private networks related applications |
US20030028650A1 (en) * | 2001-07-23 | 2003-02-06 | Yihsiu Chen | Flexible automated connection to virtual private networks |
US7827292B2 (en) | 2001-07-23 | 2010-11-02 | At&T Intellectual Property Ii, L.P. | Flexible automated connection to virtual private networks |
US20030200321A1 (en) * | 2001-07-23 | 2003-10-23 | Yihsiu Chen | System for automated connection to virtual private networks related applications |
US8676916B2 (en) | 2001-07-23 | 2014-03-18 | At&T Intellectual Property Ii, L.P. | Method and apparatus for connection to virtual private networks for secure transactions |
US20030033185A1 (en) * | 2001-07-26 | 2003-02-13 | Leto Kevin R. | Method for matching a user to a subscriber |
US20030050811A1 (en) * | 2001-09-10 | 2003-03-13 | Freeman Robert B. | System and method for hiring an applicant |
US8335855B2 (en) | 2001-09-19 | 2012-12-18 | Jpmorgan Chase Bank, N.A. | System and method for portal infrastructure tracking |
US20060173791A1 (en) * | 2001-09-21 | 2006-08-03 | First Usa Bank, N.A. | System for providing cardless payment |
US9646304B2 (en) | 2001-09-21 | 2017-05-09 | Jpmorgan Chase Bank, N.A. | System for providing cardless payment |
US7783578B2 (en) | 2001-09-21 | 2010-08-24 | Jpmorgan Chase Bank, N.A. | System for providing cardless payment |
US20030083891A1 (en) * | 2001-10-25 | 2003-05-01 | Lang Kenny W. | Project Management tool |
US7689504B2 (en) | 2001-11-01 | 2010-03-30 | Jpmorgan Chase Bank, N.A. | System and method for establishing or modifying an account with user selectable terms |
US20070118470A1 (en) * | 2001-11-01 | 2007-05-24 | Jpmorgan Chase Bank, N.A. | System and Method for Establishing or Modifying an Account With User Selectable Terms |
US8145522B2 (en) | 2001-11-01 | 2012-03-27 | Jpmorgan Chase Bank, N.A. | System and method for establishing or modifying an account with user selectable terms |
US8732072B2 (en) | 2001-11-01 | 2014-05-20 | Jpmorgan Chase Bank, N.A. | System and method for establishing or modifying an account with user selectable terms |
US8250025B2 (en) | 2001-11-06 | 2012-08-21 | Business Controls, Inc. | Anonymous reporting system |
US20060229995A1 (en) * | 2001-11-06 | 2006-10-12 | Ferraro Eugene F | Report form generator for anonymous reporting system |
US20090235084A1 (en) * | 2001-11-06 | 2009-09-17 | Ferraro Eugene F | Anonymous reporting system |
US8121851B2 (en) | 2001-11-30 | 2012-02-21 | United Negro College Fund, Inc. | Selection of individuals from a pool of candidates in a competition system |
US7792685B2 (en) | 2001-11-30 | 2010-09-07 | United Negro College Fund, Inc. | Selection of individuals from a pool of candidates in a competition system |
US7321858B2 (en) | 2001-11-30 | 2008-01-22 | United Negro College Fund, Inc. | Selection of individuals from a pool of candidates in a competition system |
US8560333B2 (en) | 2001-11-30 | 2013-10-15 | United Negro College Fund, Inc. | Selection of individuals from a pool of candidates in a competition system |
US20030105642A1 (en) * | 2001-11-30 | 2003-06-05 | United Negro College Fund, Inc. | Selection of individuals from a pool of candidates in a competition system |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US7565377B2 (en) | 2001-12-05 | 2009-07-21 | Robert Michael Watson | Artificially intelligent fulfillment system |
US20110256852A1 (en) * | 2001-12-20 | 2011-10-20 | Stevens Lawrence A | Systems and methods for storage of user information and for verifying user identity |
US20040014457A1 (en) * | 2001-12-20 | 2004-01-22 | Stevens Lawrence A. | Systems and methods for storage of user information and for verifying user identity |
US7929951B2 (en) * | 2001-12-20 | 2011-04-19 | Stevens Lawrence A | Systems and methods for storage of user information and for verifying user identity |
US20030158949A1 (en) * | 2002-02-19 | 2003-08-21 | Miller Lawrence R. | System and method for single sign-on session management without central server |
US7941533B2 (en) | 2002-02-19 | 2011-05-10 | Jpmorgan Chase Bank, N.A. | System and method for single sign-on session management without central server |
US20030177277A1 (en) * | 2002-03-15 | 2003-09-18 | Ziv Dascalu | System and method for personal referrals |
US20140122364A1 (en) * | 2002-03-19 | 2014-05-01 | Career Destination Development, Llc | Career and employment services system and apparatus |
US8660871B2 (en) | 2002-03-19 | 2014-02-25 | Career Destination Development, Llc | Apparatus and methods for providing career employment services |
US20140122366A1 (en) * | 2002-03-19 | 2014-05-01 | Career Destination Development, Llc | Career and employment services system and apparatus |
US20140129467A1 (en) * | 2002-03-19 | 2014-05-08 | Career Destination Development, Llc | Career and employment services system and apparatus |
US20080183585A1 (en) * | 2002-03-19 | 2008-07-31 | Marc Vianello | Apparatus and methods for providing career employment services |
US20080183488A1 (en) * | 2002-03-19 | 2008-07-31 | Marc Vianello | Apparatus and methods for providing career employment services |
US20140129468A1 (en) * | 2002-03-19 | 2014-05-08 | Career Destination Development, Llc | Career and employment services system and apparatus |
US20140122365A1 (en) * | 2002-03-19 | 2014-05-01 | Career Destination Development, Llc | Career and employment services system and apparatus |
US20140129470A1 (en) * | 2002-03-19 | 2014-05-08 | Career Destination Development, Llc | Apparatus & methods for providing career employment services |
US20140122361A1 (en) * | 2002-03-19 | 2014-05-01 | Career Destination Development, Llc | Career and employment services system and apparatus |
US7797181B2 (en) | 2002-03-19 | 2010-09-14 | Marc Vianello | Apparatus and methods for providing career employment services |
US20140129469A1 (en) * | 2002-03-19 | 2014-05-08 | Career Destination Development, Llc | Career and employment services system and apparatus |
US20140122363A1 (en) * | 2002-03-19 | 2014-05-01 | Career Destination Development, Llc | Career and employment services system and apparatus |
US20140122362A1 (en) * | 2002-03-19 | 2014-05-01 | Career Destination Development, Llc | Career and employment services system and apparatus |
US20030208752A1 (en) * | 2002-05-03 | 2003-11-06 | Veleria Farris | Employee candidate computer and web-based interactive assessment software and method of employee candidate assessment |
US20040111300A1 (en) * | 2002-05-20 | 2004-06-10 | Callen Brock W. | Tax withholding on employee termination benefits |
US20030218633A1 (en) * | 2002-05-23 | 2003-11-27 | Grinshetyn Mikhail | Method and system for data capture with hidden applets |
US7748029B2 (en) | 2002-05-29 | 2010-06-29 | Raf Technology, Inc. | Authentication query strategizer and results compiler |
US20080127305A1 (en) * | 2002-05-29 | 2008-05-29 | Raf Technology, Inc. | Authentication query strategizer and results compiler |
US20030233459A1 (en) * | 2002-06-12 | 2003-12-18 | Lawrence Miller | Method and system for delayed cookie transmission in a client-server architecture |
US20050226411A1 (en) * | 2002-06-19 | 2005-10-13 | Gemplus | Method of generating electronic keys for a public-key cryptography method and a secure portable object using said method |
US20030236862A1 (en) * | 2002-06-21 | 2003-12-25 | Lawrence Miller | Method and system for determining receipt of a delayed cookie in a client-server architecture |
US7756816B2 (en) | 2002-10-02 | 2010-07-13 | Jpmorgan Chase Bank, N.A. | System and method for network-based project management |
US11409776B2 (en) | 2002-11-05 | 2022-08-09 | OneTrust, LLC | Anonymous reporting system |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
US20040148220A1 (en) * | 2003-01-27 | 2004-07-29 | Freeman Robert B. | System and method for candidate management |
US20040210770A1 (en) * | 2003-04-17 | 2004-10-21 | Aleksey Sanin | Use of pseudonyms vs. real names |
US7107447B2 (en) * | 2003-04-17 | 2006-09-12 | America Online, Inc. | Use of pseudonyms vs. real names |
US20040225550A1 (en) * | 2003-05-06 | 2004-11-11 | Interactive Clinical Systems, Inc. | Software program for, system for, and method of facilitating staffing of an opening in a work schedule at a facility |
US20050021623A1 (en) * | 2003-05-07 | 2005-01-27 | Ahmed Syed Mike | Computer-implemented system for matching parties and subsequent automatic notification to matched parties |
US20090112670A1 (en) * | 2003-05-29 | 2009-04-30 | Black Steven C | Human resources method for employee termination procedures |
US20090182602A1 (en) * | 2003-05-29 | 2009-07-16 | Hotlinkhr, Inc. | Human resources method for employee demographics reporting compliance |
US20040243428A1 (en) * | 2003-05-29 | 2004-12-02 | Black Steven C. | Automated compliance for human resource management |
US7305398B2 (en) | 2003-06-15 | 2007-12-04 | Mordechai Teicher | Apparatus and method for managing social games |
US20060143214A1 (en) * | 2003-06-15 | 2006-06-29 | Mordechai Teicher | Method and apparatus for arranging social meetings |
US8219501B2 (en) | 2003-06-15 | 2012-07-10 | Mordechai Teicher | Method and apparatus for arranging face-to-face meetings |
US8260641B2 (en) | 2003-06-15 | 2012-09-04 | Mordechai Teicher | System and method for leisure and entertainment merchandising by attraction providers |
US7761386B2 (en) | 2003-06-15 | 2010-07-20 | Mordechai Teicher | Method and apparatus for arranging social meetings |
US20100268656A1 (en) * | 2003-06-15 | 2010-10-21 | Mordechai Teicher | Method and Apparatus for Arranging Face-to-Face Meetings |
US8090602B2 (en) | 2003-06-15 | 2012-01-03 | Mordechai Teicher | Method and apparatus for leisure and entertainment merchandising |
US20040254809A1 (en) * | 2003-06-15 | 2004-12-16 | Mordechai Teicher | Apparatus and method for managing social games |
US20060129551A1 (en) * | 2003-06-15 | 2006-06-15 | Mordechai Teicher | Method and apparatus for leisure & entertainment merchandising |
US8888496B1 (en) * | 2003-08-04 | 2014-11-18 | Skill Survey, Inc. | System and method for evaluating job candidates |
US8721340B2 (en) * | 2003-08-04 | 2014-05-13 | Skill Survey, Inc. | System and method for evaluating job candidates |
US20050033633A1 (en) * | 2003-08-04 | 2005-02-10 | Lapasta Douglas G. | System and method for evaluating job candidates |
US20130332382A1 (en) * | 2003-08-04 | 2013-12-12 | Skill Survey, Inc. | System and method for evaluating job candidates |
WO2005040998A1 (en) * | 2003-09-30 | 2005-05-06 | British Telecommunications Public Limited Company | Method and system for authenticating a user |
US20070055871A1 (en) * | 2003-09-30 | 2007-03-08 | British Telecommunications Public Limited Company | Method and system for authenticating a user |
US7290278B2 (en) | 2003-10-02 | 2007-10-30 | Aol Llc, A Delaware Limited Liability Company | Identity based service system |
US8190893B2 (en) | 2003-10-27 | 2012-05-29 | Jp Morgan Chase Bank | Portable security transaction protocol |
US20050137896A1 (en) * | 2003-12-22 | 2005-06-23 | Pentecost Jared D. | Integrated recruiting system and method |
US20050240457A1 (en) * | 2004-01-30 | 2005-10-27 | Connally Samuel B | Systems, methods and computer program products for facilitating evaluation of job applicants by search committees |
US8914383B1 (en) * | 2004-04-06 | 2014-12-16 | Monster Worldwide, Inc. | System and method for providing job recommendations |
US20050261950A1 (en) * | 2004-05-21 | 2005-11-24 | Mccandliss Glenn A | Method of scheduling appointment coverage for service professionals |
US9319479B2 (en) | 2004-07-30 | 2016-04-19 | Microsoft Technology Licensing, Llc | Suggesting a discussion group based on indexing of the posts within that discussion group |
US20060036685A1 (en) * | 2004-07-30 | 2006-02-16 | Microsoft Corporation | Suggesting a discussion group based on indexing of the posts within that discussion group |
US10257155B2 (en) | 2004-07-30 | 2019-04-09 | Microsoft Technology Licensing, Llc | Suggesting a discussion group based on indexing of the posts within that discussion group |
US20110131283A1 (en) * | 2004-07-30 | 2011-06-02 | Microsoft Corporation | Suggesting a discussion group based on indexing of the posts within that discussion group |
US7844668B2 (en) * | 2004-07-30 | 2010-11-30 | Microsoft Corporation | Suggesting a discussion group based on indexing of the posts within that discussion group |
US20060080593A1 (en) * | 2004-10-08 | 2006-04-13 | Alexander Hudspith | System and method for generating computer-readable documents |
US20060085736A1 (en) * | 2004-10-16 | 2006-04-20 | Au Anthony S | A Scientific Formula and System which derives standardized data and faster search processes in a Personnel Recruiting System, that generates more accurate results |
US20090287532A1 (en) * | 2004-11-16 | 2009-11-19 | Cohen Peter D | Providing an electronic marketplace to facilitate human performance of programmatically submitted tasks |
US8392235B1 (en) | 2004-11-16 | 2013-03-05 | Amazon Technologies, Inc. | Performing automated price determination for tasks to be performed |
US20060106774A1 (en) * | 2004-11-16 | 2006-05-18 | Cohen Peter D | Using qualifications of users to facilitate user performance of tasks |
US8306840B2 (en) | 2004-11-16 | 2012-11-06 | Amazon Technologies, Inc. | Providing an electronic marketplace to facilitate human performance of programmatically submitted tasks |
US8005697B1 (en) | 2004-11-16 | 2011-08-23 | Amazon Technologies, Inc. | Performing automated price determination for tasks to be performed |
US20060106675A1 (en) * | 2004-11-16 | 2006-05-18 | Cohen Peter D | Providing an electronic marketplace to facilitate human performance of programmatically submitted tasks |
US7945469B2 (en) | 2004-11-16 | 2011-05-17 | Amazon Technologies, Inc. | Providing an electronic marketplace to facilitate human performance of programmatically submitted tasks |
US20060106667A1 (en) * | 2004-11-18 | 2006-05-18 | Coyne Christopher R | System and method for determining compatibility |
US20060116894A1 (en) * | 2004-11-29 | 2006-06-01 | Dimarco Anthony M | Talent management and career management system |
US8135704B2 (en) | 2005-03-11 | 2012-03-13 | Yahoo! Inc. | System and method for listing data acquisition |
US20060206584A1 (en) * | 2005-03-11 | 2006-09-14 | Yahoo! Inc. | System and method for listing data acquisition |
US20060206517A1 (en) * | 2005-03-11 | 2006-09-14 | Yahoo! Inc. | System and method for listing administration |
US20060206344A1 (en) * | 2005-03-12 | 2006-09-14 | Au Anthony S | Scientific Formula and System which derives and creates a standardized data table in a Personnel Recruiting System |
US7676433B1 (en) | 2005-03-24 | 2010-03-09 | Raf Technology, Inc. | Secure, confidential authentication with private data |
US20060224729A1 (en) * | 2005-03-29 | 2006-10-05 | H Three, Inc. | Referral tracking |
US20080027747A1 (en) * | 2005-04-11 | 2008-01-31 | Mcgovern Robert | Method and apparatus for employment system distributed hiring and co-operative pooling |
US7870079B2 (en) * | 2005-04-11 | 2011-01-11 | Jobfox, Inc. | Method and apparatus for employment system distributed hiring and co-operative pooling |
US8517742B1 (en) * | 2005-05-17 | 2013-08-27 | American Express Travel Related Services Company, Inc. | Labor resource testing system and method |
US9959525B2 (en) | 2005-05-23 | 2018-05-01 | Monster Worldwide, Inc. | Intelligent job matching system and method |
US8977618B2 (en) | 2005-05-23 | 2015-03-10 | Monster Worldwide, Inc. | Intelligent job matching system and method |
US20060265269A1 (en) * | 2005-05-23 | 2006-11-23 | Adam Hyder | Intelligent job matching system and method including negative filtration |
US20060265266A1 (en) * | 2005-05-23 | 2006-11-23 | Changesheng Chen | Intelligent job matching system and method |
US20060265268A1 (en) * | 2005-05-23 | 2006-11-23 | Adam Hyder | Intelligent job matching system and method including preference ranking |
US20060265270A1 (en) * | 2005-05-23 | 2006-11-23 | Adam Hyder | Intelligent job matching system and method |
US8375067B2 (en) | 2005-05-23 | 2013-02-12 | Monster Worldwide, Inc. | Intelligent job matching system and method including negative filtration |
US8527510B2 (en) | 2005-05-23 | 2013-09-03 | Monster Worldwide, Inc. | Intelligent job matching system and method |
US20060265267A1 (en) * | 2005-05-23 | 2006-11-23 | Changsheng Chen | Intelligent job matching system and method |
US7720791B2 (en) | 2005-05-23 | 2010-05-18 | Yahoo! Inc. | Intelligent job matching system and method including preference ranking |
US8433713B2 (en) | 2005-05-23 | 2013-04-30 | Monster Worldwide, Inc. | Intelligent job matching system and method |
US8117091B2 (en) | 2005-06-17 | 2012-02-14 | Match.Com, L.L.C. | System and method for providing a certified photograph in a network environment |
US20100017469A1 (en) * | 2005-06-17 | 2010-01-21 | Match.Com, L.L.C. | System and Method for Providing a Certified Photograph in a Network Environment |
US8185877B1 (en) | 2005-06-22 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for testing applications |
US9374366B1 (en) | 2005-09-19 | 2016-06-21 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US10027707B2 (en) | 2005-09-19 | 2018-07-17 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US8583926B1 (en) | 2005-09-19 | 2013-11-12 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US9661021B2 (en) | 2005-09-19 | 2017-05-23 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US20070073803A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing a post-date component in a network environment |
US20070073548A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing a system that includes on-line and off-line features in a network environment |
US20100125530A1 (en) * | 2005-09-27 | 2010-05-20 | Match.Com, L.L.C. | System and method for providing enhanced questions for matching in a network environment |
US20070073802A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing on-line dating features in a network environment |
US20070073687A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing enhanced questions for matching in a network environment |
US20070073711A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing a pre-date component in a network environment |
US8051013B2 (en) | 2005-09-27 | 2011-11-01 | Match.Com, L.L.C. | System and method for providing a system that includes on-line and off-line features in a network environment |
US20070072468A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing an enhanced selection process in a network environment |
US7676466B2 (en) | 2005-09-27 | 2010-03-09 | Match.Com, L.L.C. | System and method for providing enhanced questions for matching in a network environment |
US8473490B2 (en) | 2005-09-27 | 2013-06-25 | Match.Com, L.L.C. | System and method for providing a near matches feature in a network environment |
US8010546B2 (en) | 2005-09-27 | 2011-08-30 | Match.Com, L.L.C. | System and method for providing enhanced questions for matching in a network environment |
US8010556B2 (en) | 2005-09-27 | 2011-08-30 | Match.Com, L.L.C. | System and method for providing a search feature in a network environment |
US7613706B2 (en) | 2005-09-27 | 2009-11-03 | Match.Com L.L.C. | System and method for providing a search feature in a network environment |
US20070073549A1 (en) * | 2005-09-27 | 2007-03-29 | Match.Com, L.P. | System and method for providing testing and matching in a network environment |
US20100017375A1 (en) * | 2005-09-27 | 2010-01-21 | Match.Com, L.L.C. | System and Method for Providing a Search Feature in a Network Environment |
US8533019B2 (en) * | 2005-09-29 | 2013-09-10 | Lifeworx, Inc. | System and method for a household services marketplace |
US20130018687A1 (en) * | 2005-09-29 | 2013-01-17 | Lifeworx, Inc. | System and method for a household services marketplace |
US20070106547A1 (en) * | 2005-09-29 | 2007-05-10 | Bal Agrawal | System and method for a household services marketplace |
US8301478B2 (en) * | 2005-09-29 | 2012-10-30 | Lifeworx, Inc. | System and method for a household services marketplace |
US20070088562A1 (en) * | 2005-10-18 | 2007-04-19 | International Business Machines Corporation | Method and program product for identifying educational content for a business initiative |
US20070116241A1 (en) * | 2005-11-10 | 2007-05-24 | Flocken Phil A | Support case management system |
US20070129517A1 (en) * | 2005-12-02 | 2007-06-07 | Lang Angela J | Method for preparing a flexible superabsorbent binder polymer composition |
US7627508B2 (en) | 2006-01-04 | 2009-12-01 | S.R. Clarke, Inc. | Method for tracking employees |
US20070185722A1 (en) * | 2006-01-04 | 2007-08-09 | Clarke Spencer R | Method for tracking employees |
US10181116B1 (en) | 2006-01-09 | 2019-01-15 | Monster Worldwide, Inc. | Apparatuses, systems and methods for data entry correlation |
US8103679B1 (en) | 2006-01-13 | 2012-01-24 | CareerBuilder, LLC | Method and system for matching data sets of non-standard formats |
US8375026B1 (en) | 2006-01-13 | 2013-02-12 | CareerBuilder, LLC | Method and system for matching data sets of non-standard formats |
US8090725B1 (en) | 2006-01-13 | 2012-01-03 | CareerBuilder, LLC | Method and system for matching data sets of non-standard formats |
US9355151B1 (en) | 2006-01-13 | 2016-05-31 | CareerBuilder, LLC | Systems and methods for assessing the similarity between two non-standardized data sets |
US9336333B2 (en) | 2006-02-13 | 2016-05-10 | Linkedin Corporation | Searching and reference checking within social networks |
US9043405B2 (en) | 2006-02-13 | 2015-05-26 | Linkedin Corporation | Method of leveraging social networking with a messaging client |
US20070250585A1 (en) * | 2006-02-13 | 2007-10-25 | Eric Ly | Method of leveraging social networking with a messaging client |
US20070245245A1 (en) * | 2006-02-13 | 2007-10-18 | Allen Blue | Searching and reference checking within social networks |
US20070260605A1 (en) * | 2006-03-31 | 2007-11-08 | H Three, Inc. | Multiple-Listing Referral-Tracking System |
US10387839B2 (en) | 2006-03-31 | 2019-08-20 | Monster Worldwide, Inc. | Apparatuses, methods and systems for automated online data submission |
WO2007127881A3 (en) * | 2006-04-26 | 2008-12-11 | Business Controls Inc | Anonymous reporting system |
WO2007127881A2 (en) * | 2006-04-26 | 2007-11-08 | Business Controls, Inc. | Anonymous reporting system |
US20070292834A1 (en) * | 2006-05-30 | 2007-12-20 | Paul Ransdell | Method and system for establishing compatibility between potential students and universities |
US8793490B1 (en) | 2006-07-14 | 2014-07-29 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US9240012B1 (en) | 2006-07-14 | 2016-01-19 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US9679293B1 (en) | 2006-07-14 | 2017-06-13 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
AU2006349490B2 (en) * | 2006-10-09 | 2012-04-12 | Winmark Investments Pte. Ltd | A system and method for identifying and linking users having matching confidential information |
WO2008045000A1 (en) * | 2006-10-09 | 2008-04-17 | Winmark Investments Pte. Ltd | A system and method for identifying and linking users having matching confidential information |
US20100030779A1 (en) * | 2006-10-09 | 2010-02-04 | Winmark Investments Pte. Ltd. | system and method for identifying and linking users having matching confidential information |
US20080091820A1 (en) * | 2006-10-12 | 2008-04-17 | Norman John G | Multiple-listing referral tracking system |
US20080140656A1 (en) * | 2006-12-06 | 2008-06-12 | Jason Panda | System and Method for Matching Student Job Applicants to Part-Time Job Opportunities |
WO2008089077A3 (en) * | 2007-01-12 | 2008-10-16 | Jobfox Inc | Method and apparatus for employment system distributed hiring and co-operative pooling |
WO2008089077A2 (en) * | 2007-01-12 | 2008-07-24 | Jobfox, Inc. | Method and apparatus for employment system distributed hiring and co-operative pooling |
US7991635B2 (en) * | 2007-01-17 | 2011-08-02 | Larry Hartmann | Management of job candidate interview process using online facility |
US20080172284A1 (en) * | 2007-01-17 | 2008-07-17 | Larry Hartmann | Management of job candidate interview process using online facility |
JP2008176650A (en) * | 2007-01-19 | 2008-07-31 | National Institute Of Advanced Industrial & Technology | Anonymous authentication system |
US20080208907A1 (en) * | 2007-02-23 | 2008-08-28 | Inqhire, A California Corporation | Employment recruiting |
US20080221910A1 (en) * | 2007-03-08 | 2008-09-11 | Anthony Au | Scientific Formula and System using a slider bar which derives standardized data and faster search processes in a Personnel Recruiting System that generates more accurate results |
US20080222133A1 (en) * | 2007-03-08 | 2008-09-11 | Anthony Au | System that automatically identifies key words & key texts from a source document, such as a job description, and apply both (key words & text) as context in the automatic matching with another document, such as a resume, to produce a numerically scored result. |
US20090177527A1 (en) * | 2007-04-30 | 2009-07-09 | Flake Gary W | Rewarding influencers |
US20090248493A1 (en) * | 2007-04-30 | 2009-10-01 | Flake Gary W | Systems for rewarding influences |
US8831973B2 (en) | 2007-04-30 | 2014-09-09 | The Invention Science Fund I, Llc | Systems for rewarding influencers |
US8726011B1 (en) | 2007-05-17 | 2014-05-13 | Jpmorgan Chase Bank, N.A. | Systems and methods for managing digital certificates |
US8473735B1 (en) | 2007-05-17 | 2013-06-25 | Jpmorgan Chase | Systems and methods for managing digital certificates |
US20090037235A1 (en) * | 2007-07-30 | 2009-02-05 | Anthony Au | System that automatically identifies a Candidate for hiring by using a composite score comprised of a Spec Score generated by a Candidates answers to questions and an Industry Score based on a database of key words & key texts compiled from source documents, such as job descriptions |
US20090077063A1 (en) * | 2007-09-17 | 2009-03-19 | Inventec Corporation | Dynamic member match-making system and method thereof |
US20090177535A1 (en) * | 2007-09-18 | 2009-07-09 | Pmp Corporation | System and method for monitoring and executing substitute fulfillment |
US20090083048A1 (en) * | 2007-09-21 | 2009-03-26 | Mandelbaum Steven J | System and method for providing an application service |
US8731981B2 (en) | 2008-01-04 | 2014-05-20 | Frontline Technologies, Inc. | Method, system and program product for filling job orders |
US20090177518A1 (en) * | 2008-01-04 | 2009-07-09 | Front Line Placement Technologies, Inc. | Method, system and program product for filling job orders |
US8140366B2 (en) | 2008-01-04 | 2012-03-20 | Frontline Technologies, Inc. | Method, system and program product for filling job orders |
US8321682B1 (en) | 2008-01-24 | 2012-11-27 | Jpmorgan Chase Bank, N.A. | System and method for generating and managing administrator passwords |
US8549315B2 (en) | 2008-01-24 | 2013-10-01 | Jpmorgan Chase Bank, N.A. | System and method for generating and managing administrator passwords |
US20090198558A1 (en) * | 2008-02-04 | 2009-08-06 | Yahoo! Inc. | Method and system for recommending jobseekers to recruiters |
US9830575B1 (en) | 2008-04-21 | 2017-11-28 | Monster Worldwide, Inc. | Apparatuses, methods and systems for advancement path taxonomy |
US10387837B1 (en) | 2008-04-21 | 2019-08-20 | Monster Worldwide, Inc. | Apparatuses, methods and systems for career path advancement structuring |
US9779390B1 (en) | 2008-04-21 | 2017-10-03 | Monster Worldwide, Inc. | Apparatuses, methods and systems for advancement path benchmarking |
US8468073B2 (en) | 2008-06-30 | 2013-06-18 | The Invention Science Fund I, Llc | Facilitating compensation arrangements providing for data tracking components |
US20090327042A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation arrangements having privacy preservation aspects |
US8429040B2 (en) | 2008-06-30 | 2013-04-23 | The Invention Science Fund I, Llc | Facilitating compensation arrangements for data brokering |
US8473387B2 (en) | 2008-06-30 | 2013-06-25 | The Invention Science Fund I, Llc | Facilitating compensation arrangements between data providers and data consumers |
US20090327066A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation arrangements providing for data tracking components |
US20090327041A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation arrangements between data providers and data consumers |
US20090327150A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation arrangements providing for data tracking components |
US20090327149A1 (en) * | 2008-06-30 | 2009-12-31 | Flake Gary W | Facilitating compensation Arrangements for Data Brokering |
US8473388B2 (en) | 2008-06-30 | 2013-06-25 | The Invention Science Fund I, Llc | Facilitating compensation arrangements providing for data tracking components |
US20110066519A1 (en) * | 2008-08-21 | 2011-03-17 | Flake Gary W | Facilitating data brokering arrangements having auctioning aspects |
US20100077032A1 (en) * | 2008-09-05 | 2010-03-25 | Match.Com, L.P. | System and method for providing enhanced matching based on question responses |
US8195668B2 (en) | 2008-09-05 | 2012-06-05 | Match.Com, L.L.C. | System and method for providing enhanced matching based on question responses |
US20100082356A1 (en) * | 2008-09-30 | 2010-04-01 | Yahoo! Inc. | System and method for recommending personalized career paths |
US20100161503A1 (en) * | 2008-12-19 | 2010-06-24 | Foster Scott C | System and Method for Online Employment Recruiting and Evaluation |
US8112365B2 (en) | 2008-12-19 | 2012-02-07 | Foster Scott C | System and method for online employment recruiting and evaluation |
US8583563B1 (en) | 2008-12-23 | 2013-11-12 | Match.Com, L.L.C. | System and method for providing enhanced matching based on personality analysis |
US10762501B2 (en) | 2009-06-29 | 2020-09-01 | Jpmorgan Chase Bank, N.A. | System and method for partner key management |
US9608826B2 (en) | 2009-06-29 | 2017-03-28 | Jpmorgan Chase Bank, N.A. | System and method for partner key management |
US10664804B2 (en) * | 2009-11-20 | 2020-05-26 | David Ciccarelli | Computer-implemented method of facilitating online interactions involving voice recordings using multiple electronic interfaces |
US10909504B2 (en) * | 2009-11-20 | 2021-02-02 | Voices.Com Inc. | System for managing online transactions involving voice talent |
US20160328680A1 (en) * | 2009-11-20 | 2016-11-10 | David Ciccarelli | Computer-implemented method of facilitating online interactions involving voice recordings using multiple electronic interfaces |
US20160148161A1 (en) * | 2009-11-20 | 2016-05-26 | David Ciccarelli | System for managing online transactions involving voice talent |
US8595080B2 (en) | 2010-04-09 | 2013-11-26 | XO Group Inc. | Systems and methods for a centralized gift registry with two-way synchronization |
US8478656B2 (en) | 2010-04-09 | 2013-07-02 | XO Group Inc. | Systems and methods for a centralized gift registry with upload and merge of a retailer-specific registry |
US8219452B2 (en) | 2010-04-09 | 2012-07-10 | XO Group Inc. | Systems and methods for a centralized gift registry with upload and merge of a retailer-specific registry |
US8543515B2 (en) | 2011-02-25 | 2013-09-24 | Career Management Solutions, Llc | System and method for social recruiting |
US9419957B1 (en) | 2013-03-15 | 2016-08-16 | Jpmorgan Chase Bank, N.A. | Confidence-based authentication |
US10339294B2 (en) | 2013-03-15 | 2019-07-02 | Jpmorgan Chase Bank, N.A. | Confidence-based authentication |
US20140289141A1 (en) * | 2013-03-22 | 2014-09-25 | George Kolber | Employment Job Centers with Equal Opportunity Tools |
US10579826B2 (en) * | 2013-09-17 | 2020-03-03 | Samsung Electronics Co., Ltd. | Method of transmitting anonymous message and message transmission system using the same |
US20150081815A1 (en) * | 2013-09-17 | 2015-03-19 | Samsung Electronics Co., Ltd | Method of transmitting anonymous message and message transmission system using the same |
US20150111188A1 (en) * | 2013-10-23 | 2015-04-23 | Saji Maruthurkkara | Query Response System for Medical Device Recipients |
US10438225B1 (en) | 2013-12-18 | 2019-10-08 | Amazon Technologies, Inc. | Game-based automated agent detection |
US9985943B1 (en) | 2013-12-18 | 2018-05-29 | Amazon Technologies, Inc. | Automated agent detection using multiple factors |
US20150186848A1 (en) * | 2013-12-31 | 2015-07-02 | Danny Wu | Third Party Interview Method |
US10148726B1 (en) | 2014-01-24 | 2018-12-04 | Jpmorgan Chase Bank, N.A. | Initiating operating system commands based on browser cookies |
US10686864B2 (en) | 2014-01-24 | 2020-06-16 | Jpmorgan Chase Bank, N.A. | Initiating operating system commands based on browser cookies |
US20150235180A1 (en) * | 2014-02-14 | 2015-08-20 | Recruiter Mls, Inc. | System and method for unifying an employment network of recruiters |
US11995613B2 (en) | 2014-05-13 | 2024-05-28 | Monster Worldwide, Inc. | Search extraction matching, draw attention-fit modality, application morphing, and informed apply apparatuses, methods and systems |
US20180173888A1 (en) * | 2015-03-23 | 2018-06-21 | Intel Corporation | Systems, methods, and apparatus to provide private information retrieval |
US9904793B2 (en) * | 2015-03-23 | 2018-02-27 | Intel Corporation | Systems, methods, and apparatus to provide private information retrieval |
US10402579B2 (en) * | 2015-03-23 | 2019-09-03 | Intel Corporation | Systems, methods, and apparatus to provide private information retrieval |
US20210035046A1 (en) * | 2019-07-30 | 2021-02-04 | OLX Global B.V. | Real-time recommendation systems and methods |
US11636409B2 (en) * | 2019-07-30 | 2023-04-25 | OLX Global B.V. | Real-time recommendation systems and methods |
US11120404B2 (en) | 2019-08-07 | 2021-09-14 | Capital One Services, Llc | Method and system for dynamic data collection while optimize a smart device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5884270A (en) | Method and system for facilitating an employment search incorporating user-controlled anonymous communications | |
US5884272A (en) | Method and system for establishing and maintaining user-controlled anonymous communications | |
US20010034708A1 (en) | Method and system for establishing and maintaining user-controlled anonymous communications | |
US20060241964A1 (en) | Method and system for anonymous communication of information about a home | |
US20070129966A1 (en) | Method and system for anonymous communication of information | |
CA2264912C (en) | Method and system for establishing and maintaining user-controlled anonymous communications | |
US7472277B2 (en) | User controlled anonymity when evaluating into a role | |
US6539093B1 (en) | Key ring organizer for an electronic business using public key infrastructure | |
US6792531B2 (en) | Method and system for revocation of certificates used to certify public key users | |
US20030163686A1 (en) | System and method for ad hoc management of credentials, trust relationships and trust history in computing environments | |
US8024570B2 (en) | Method and system for communication via a computer network | |
US20080028100A1 (en) | Tracking domain name related reputation | |
US20070143173A1 (en) | Method and system for anonymous communication of information about a home | |
Winn | The emperor's new clothes: The shocking truth about digital signatures and internet commerce | |
EP1721256A2 (en) | Use of public switched telephone network for capturing electronic signatures in on-line transactions | |
CN109067808B (en) | Method and device for realizing block chain real-name system authentication based on social relationship guarantee | |
US20030135734A1 (en) | Secure mutual authentication system | |
KR20080094000A (en) | Method and apparatus for establishing peer-to-peer karma and trust | |
CA2572249A1 (en) | Transmission of anonymous information through a communication network | |
CN116150801B (en) | Human resource management system based on block chain encryption | |
US11496316B1 (en) | System and method for identity verification for online dating | |
WO2002049311A2 (en) | Pseudonym credentialing system | |
Yeh et al. | Applying lightweight directory access protocol service on session certification authority | |
Muñoz-Tapia et al. | CPC-OCSP: an adaptation of OCSP for m-Commerce | |
EP1175067B1 (en) | Method and arrangement for managing data transmission in a data network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: THOMAS JEFFERSON UNIVERSITY, PENNSYLVANIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BASERGA, RENATO L.;RESNICOFF,MARIANA;HUANG, ZIWEI;REEL/FRAME:008420/0166;SIGNING DATES FROM 19961106 TO 19961108 |
|
AS | Assignment |
Owner name: WALKER ASSET MANAGEMENT, LIMITED PARTNERSHIP, CONN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WALKER, JAY S.;SCHNEIER, BRUCE;CASE, T. SCOTT;REEL/FRAME:008325/0651;SIGNING DATES FROM 19961218 TO 19961220 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: WALKER DIGITAL, LLC., CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WALKER DIGITAL CORPORATION;REEL/FRAME:010648/0653 Effective date: 19991130 Owner name: WALKER DIGITAL, LLC.,CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WALKER DIGITAL CORPORATION;REEL/FRAME:010648/0653 Effective date: 19991130 |
|
AS | Assignment |
Owner name: JAY WALKER, CONNECTICUT Free format text: SECURITY AGREEMENT;ASSIGNOR:WALKER DIGITAL, LLC;REEL/FRAME:011277/0178 Effective date: 20001201 Owner name: JAY WALKER,CONNECTICUT Free format text: SECURITY AGREEMENT;ASSIGNOR:WALKER DIGITAL, LLC;REEL/FRAME:011277/0178 Effective date: 20001201 |
|
AS | Assignment |
Owner name: GAP-WD HOLDINGS, INC., CONNECTICUT Free format text: SECURITY INTEREST;ASSIGNOR:WALKER DIGITAL, LLC.;REEL/FRAME:011399/0501 Effective date: 20001208 Owner name: GAP-WD HOLDINGS, INC.,CONNECTICUT Free format text: SECURITY INTEREST;ASSIGNOR:WALKER DIGITAL, LLC.;REEL/FRAME:011399/0501 Effective date: 20001208 |
|
AS | Assignment |
Owner name: WALKER, JAY, CONNECTICUT Free format text: SECURITY INTEREST;ASSIGNOR:WALKER DIGITAL, LLC;REEL/FRAME:011874/0792 Effective date: 20010531 Owner name: WALKER, JAY,CONNECTICUT Free format text: SECURITY INTEREST;ASSIGNOR:WALKER DIGITAL, LLC;REEL/FRAME:011874/0792 Effective date: 20010531 |
|
REFU | Refund |
Free format text: REFUND - PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: R1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: LTOS); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
REFU | Refund |
Free format text: REFUND - PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: R1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: WALKER DIGITAL, LLC, CONNECTICUT Free format text: RELEASE OF LIEN;ASSIGNOR:WALKER, JAY;REEL/FRAME:017073/0477 Effective date: 20060125 Owner name: WALKER DIGITAL, LLC, CONNECTICUT Free format text: RELEASE OF LIEN;ASSIGNOR:GAP-WD HOLDINGS, INC.;REEL/FRAME:017073/0445 Effective date: 20060125 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FPAY | Fee payment |
Year of fee payment: 12 |
|
AS | Assignment |
Owner name: WALKER DIGITAL CORPORATION, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JAY S. WALKER IRREVOCABLE CREDIT SHELTER TRUST;REEL/FRAME:027508/0589 Effective date: 19991018 |
|
CC | Certificate of correction | ||
CBM | Aia trial proceeding filed before patent trial and appeal board: covered business methods |
Free format text: TRIAL NO: CBM2014-00002 Opponent name: GOOGLE, INC. Effective date: 20131004 |
|
AS | Assignment |
Owner name: INVENTOR HOLDINGS, LLC, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WALKER DIGITAL, LLC;REEL/FRAME:031797/0629 Effective date: 20131101 |
|
AS | Assignment |
Owner name: IGT, NEVADA Free format text: LICENSE;ASSIGNORS:WALKER DIGITAL GAMING, LLC;WALKER DIGITAL GAMING HOLDING, LLC;WDG EQUITY, LLC;AND OTHERS;REEL/FRAME:033501/0023 Effective date: 20090810 |
|
PGRC | Trial and appeal board: post-grant review certificate |
Kind code of ref document: J1 Free format text: POST-GRANT REVIEW CERTIFICATE; TRIAL NO. CBM2014-00002, OCT. 4, 2013POST-GRANT REVIEW CERTIFICATE FOR PATENT 5,884,270, ISSUED MAR. 16, 1999, APPL. NO. 08/704,314, SEP. 6, 1996POST-GRANT REVIEW CERTIFICATE ISSUED FEB. 6, 2018 Effective date: 20180206 |